Searched full:secrets (Results 1 – 25 of 148) sorted by relevance
123456
| /third_party/python/Lib/test/ |
| D | test_secrets.py | 1 """Test the secrets module. 3 As most of the functions in secrets are thin wrappers around functions 8 import secrets 16 """Test secrets.compare_digest function.""" 23 self.assertTrue(secrets.compare_digest(a, b)) 24 self.assertTrue(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8'))) 28 self.assertFalse(secrets.compare_digest("abc", "abcd")) 29 self.assertFalse(secrets.compare_digest(b"abc", b"abcd")) 33 self.assertFalse(secrets.compare_digest(a, b)) 34 self.assertFalse(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8'))) [all …]
|
| /third_party/python/Doc/library/ |
| D | secrets.rst | 1 :mod:`secrets` --- Generate secure random numbers for managing secrets 4 .. module:: secrets 5 :synopsis: Generate secure random numbers for managing secrets. 13 from secrets import * 16 **Source code:** :source:`Lib/secrets.py` 20 The :mod:`secrets` module is used for generating cryptographically strong 22 authentication, security tokens, and related secrets. 24 In particular, :mod:`secrets` should be used in preference to the 36 The :mod:`secrets` module provides access to the most secure source of 61 The :mod:`secrets` module provides functions for generating secure [all …]
|
| D | crypto.rst | 19 secrets.rst
|
| /third_party/rust/crates/libc/.github/workflows/ |
| D | bors.yml | 28 github_token: "${{ secrets.GITHUB_TOKEN }}" 51 github_token: "${{ secrets.GITHUB_TOKEN }}" 86 github_token: "${{ secrets.GITHUB_TOKEN }}" 108 github_token: "${{ secrets.GITHUB_TOKEN }}" 168 github_token: "${{ secrets.GITHUB_TOKEN }}" 196 github_token: "${{ secrets.GITHUB_TOKEN }}" 215 github_token: "${{ secrets.GITHUB_TOKEN }}" 249 github_token: "${{ secrets.GITHUB_TOKEN }}" 286 github_token: "${{ secrets.GITHUB_TOKEN }}" 357 github_token: "${{ secrets.GITHUB_TOKEN }}"
|
| /third_party/openssl/demos/keyexch/ |
| D | x25519.c | 173 /* Allocate memory for shared secrets. */ in keyexch_x25519_after() 234 * Here we demonstrate the secrets are equal for exposition purposes. in keyexch_x25519() 236 * Although in practice you will generally not need to compare secrets in keyexch_x25519() 237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519() 242 fprintf(stderr, "Negotiated secrets do not match\n"); in keyexch_x25519() 255 /* The secrets are sensitive, so ensure they are erased before freeing. */ in keyexch_x25519()
|
| /third_party/littlefs/.github/workflows/ |
| D | post-release.yml | 18 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \ 19 "$GITHUB_API_URL/repos/${{secrets.POST_RELEASE_REPO}}/dispatches" \
|
| D | status.yml | 35 curl -sS -H "authorization: token ${{secrets.BOT_TOKEN}}" \ 46 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \
|
| D | release.yml | 24 token: ${{secrets.BOT_TOKEN}} 182 git config user.name ${{secrets.BOT_USER}} 183 git config user.email ${{secrets.BOT_EMAIL}} 206 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \
|
| /third_party/rust/crates/pin-project-lite/.github/workflows/ |
| D | release.yml | 42 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} 45 CARGO_REGISTRY_TOKEN: ${{ secrets.CARGO_REGISTRY_TOKEN }}
|
| D | pr.yml | 19 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/harfbuzz/.github/workflows/ |
| D | coverity-scan.yml | 21 TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }} 39 TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
|
| D | linux-ci.yml | 29 GH_TOKEN: ${{ secrets.GH_TOKEN }} 43 # github-token: ${{ secrets.PERSONAL_GITHUB_TOKEN }}
|
| /third_party/mbedtls/docs/ |
| D | use-psa-crypto.md | 43 Benefits: isolation of long-term secrets, use of PSA Crypto drivers. 73 Benefits: isolation of long-term secrets. 91 Benefits: use of PSA Crypto drivers; partial isolation of short-term secrets
|
| /third_party/rust/crates/signal-hook/.github/workflows/ |
| D | audit.yaml | 17 token: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/node/tools/gyp/.github/workflows/ |
| D | release-please.yml | 13 token: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/mbedtls/library/ |
| D | ssl_tls13_keys.h | 126 * from the client/server traffic secrets. 143 * \param secret_len Length of the secrets \p client_secret and 389 * the three main secrets during the handshake: The early 413 * Each of the three secrets in turn is the basis for further 417 * This function implements one step in this evolution of secrets:
|
| /third_party/rust/crates/bindgen/.github/workflows/ |
| D | sync-master-from-main.yml | 21 github_token: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/typescript/.github/workflows/ |
| D | twoslash-repros.yaml | 23 github-token: ${{ secrets.TS_BOT_GITHUB_TOKEN }}
|
| D | nightly.yaml | 32 NODE_AUTH_TOKEN: ${{secrets.npm_token}}
|
| /third_party/flatbuffers/.github/workflows/ |
| D | label.yml | 19 repo-token: "${{ secrets.GITHUB_TOKEN }}"
|
| D | stale.yml | 15 repo-token: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/rust/crates/once_cell/.github/workflows/ |
| D | ci.yaml | 27 CARGO_REGISTRY_TOKEN: ${{ secrets.CRATES_IO_TOKEN }}
|
| /third_party/rust/crates/clap/.github/workflows/ |
| D | audit.yml | 26 token: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/rust/crates/tracing/.github/workflows/ |
| D | release.yml | 24 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
| /third_party/rust/crates/env_logger/.github/workflows/ |
| D | docs.yml | 39 github_token: ${{ secrets.GITHUB_TOKEN }}
|
123456