/dports/security/seal/SEAL-3.7.2/native/bench/ |
H A D | bench.h | 118 SEAL_NODISCARD seal::SecretKey &sk() in sk() 128 SEAL_NODISCARD seal::PublicKey &pk() in pk() 138 SEAL_NODISCARD seal::RelinKeys &rlk() in rlk() 302 seal::EncryptionParameters parms_; 303 seal::SEALContext context_; 315 seal::SecretKey sk_; 316 seal::PublicKey pk_; 317 seal::RelinKeys rlk_; 318 seal::GaloisKeys glk_; 322 std::vector<seal::Plaintext> pt_; [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/ |
H A D | seal_access.go | 13 seal Seal member 16 func NewSealAccess(seal Seal) *SealAccess { 17 return &SealAccess{seal: seal} 21 return s.seal.StoredKeysSupported() 25 return s.seal.BarrierType() 29 return s.seal.BarrierConfig(ctx) 33 return s.seal.RecoveryKeySupported() 37 return s.seal.RecoveryConfig(ctx) 45 s.seal.SetBarrierConfig(ctx, nil) 47 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/security/vault/vault-1.8.2/vault/ |
H A D | seal_access.go | 13 seal Seal member 16 func NewSealAccess(seal Seal) *SealAccess { 17 return &SealAccess{seal: seal} 21 return s.seal.StoredKeysSupported() 25 return s.seal.BarrierType() 29 return s.seal.BarrierConfig(ctx) 33 return s.seal.RecoveryKeySupported() 37 return s.seal.RecoveryConfig(ctx) 45 s.seal.SetBarrierConfig(ctx, nil) 47 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierType() 28 return s.seal.BarrierConfig(ctx) 32 return s.seal.RecoveryKeySupported() 36 return s.seal.RecoveryConfig(ctx) 44 s.seal.SetBarrierConfig(ctx, nil) 46 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/misc/concourse/vault-bdd38fca2cff/vault/ |
H A D | seal_access.go | 11 seal Seal member 14 func NewSealAccess(seal Seal) *SealAccess { 15 return &SealAccess{seal: seal} 19 return s.seal.StoredKeysSupported() 23 return s.seal.BarrierType() 27 return s.seal.BarrierConfig(ctx) 31 return s.seal.RecoveryKeySupported() 35 return s.seal.RecoveryConfig(ctx) 39 return s.seal.VerifyRecoveryKey(ctx, key) 43 s.seal.SetBarrierConfig(ctx, nil) [all …]
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 11 seal Seal member 14 func NewSealAccess(seal Seal) *SealAccess { 15 return &SealAccess{seal: seal} 19 return s.seal.StoredKeysSupported() 23 return s.seal.BarrierType() 27 return s.seal.BarrierConfig(ctx) 31 return s.seal.RecoveryKeySupported() 35 return s.seal.RecoveryConfig(ctx) 39 return s.seal.VerifyRecoveryKey(ctx, key) 43 s.seal.SetBarrierConfig(ctx, nil) [all …]
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierConfig(ctx) 28 return s.seal.RecoveryKeySupported() 32 return s.seal.RecoveryConfig(ctx) 36 return s.seal.VerifyRecoveryKey(ctx, key) 40 s.seal.SetBarrierConfig(ctx, nil) 42 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierConfig(ctx) 28 return s.seal.RecoveryKeySupported() 32 return s.seal.RecoveryConfig(ctx) 36 return s.seal.VerifyRecoveryKey(ctx, key) 40 s.seal.SetBarrierConfig(ctx, nil) 42 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/vault/ |
H A D | seal_access.go | 12 seal Seal member 15 func NewSealAccess(seal Seal) *SealAccess { 16 return &SealAccess{seal: seal} 20 return s.seal.StoredKeysSupported() 24 return s.seal.BarrierConfig(ctx) 28 return s.seal.RecoveryKeySupported() 32 return s.seal.RecoveryConfig(ctx) 36 return s.seal.VerifyRecoveryKey(ctx, key) 40 s.seal.SetBarrierConfig(ctx, nil) 42 s.seal.SetRecoveryConfig(ctx, nil) [all …]
|
/dports/security/seal/SEAL-3.7.2/native/src/seal/util/ |
H A D | defines.h | 121 namespace seal 126 namespace seal 162 #define SEAL_ITERATE seal::util::seal_for_each_n 232 auto SEAL_JOIN(_seal_temp_alloc_, __LINE__)(seal::util::allocate<type>(size, pool)); \ 233 seal::util::PtrIter<type *> name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get()); 239 …auto SEAL_JOIN(_seal_temp_alloc_, __LINE__)(seal::util::allocate<type>(seal::util::mul_safe(size, … 240 seal::util::StrideIter<type *> name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get(), stride); 261 seal::util::allocate_poly(poly_modulus_degree, coeff_modulus_size, pool)); \ 269 seal::util::allocate_zero_poly(poly_modulus_degree, coeff_modulus_size, pool)); \ 277 seal::util::CoeffIter name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get()); [all …]
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/misc/concourse/vault-bdd38fca2cff/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/ |
H A D | index.html.md | 4 sidebar_title: "<code>seal</code>" 5 sidebar_current: "docs-configuration-seal" 7 The seal stanza configures the seal type to use for additional data protection. 10 # `seal` Stanza 12 The `seal` stanza configures the seal type to use for additional data 18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to 28 `seal` stanza: 31 seal [NAME] { 39 seal "pkcs11" {
|