Home
last modified time | relevance | path

Searched full:secrets (Results 1 – 25 of 148) sorted by relevance

123456

/third_party/python/Lib/test/
Dtest_secrets.py1 """Test the secrets module.
3 As most of the functions in secrets are thin wrappers around functions
8 import secrets
16 """Test secrets.compare_digest function."""
23 self.assertTrue(secrets.compare_digest(a, b))
24 self.assertTrue(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8')))
28 self.assertFalse(secrets.compare_digest("abc", "abcd"))
29 self.assertFalse(secrets.compare_digest(b"abc", b"abcd"))
33 self.assertFalse(secrets.compare_digest(a, b))
34 self.assertFalse(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8')))
[all …]
/third_party/python/Doc/library/
Dsecrets.rst1 :mod:`secrets` --- Generate secure random numbers for managing secrets
4 .. module:: secrets
5 :synopsis: Generate secure random numbers for managing secrets.
13 from secrets import *
16 **Source code:** :source:`Lib/secrets.py`
20 The :mod:`secrets` module is used for generating cryptographically strong
22 authentication, security tokens, and related secrets.
24 In particular, :mod:`secrets` should be used in preference to the
36 The :mod:`secrets` module provides access to the most secure source of
61 The :mod:`secrets` module provides functions for generating secure
[all …]
Dcrypto.rst19 secrets.rst
/third_party/rust/crates/libc/.github/workflows/
Dbors.yml28 github_token: "${{ secrets.GITHUB_TOKEN }}"
51 github_token: "${{ secrets.GITHUB_TOKEN }}"
86 github_token: "${{ secrets.GITHUB_TOKEN }}"
108 github_token: "${{ secrets.GITHUB_TOKEN }}"
168 github_token: "${{ secrets.GITHUB_TOKEN }}"
196 github_token: "${{ secrets.GITHUB_TOKEN }}"
215 github_token: "${{ secrets.GITHUB_TOKEN }}"
249 github_token: "${{ secrets.GITHUB_TOKEN }}"
286 github_token: "${{ secrets.GITHUB_TOKEN }}"
357 github_token: "${{ secrets.GITHUB_TOKEN }}"
/third_party/openssl/demos/keyexch/
Dx25519.c173 /* Allocate memory for shared secrets. */ in keyexch_x25519_after()
234 * Here we demonstrate the secrets are equal for exposition purposes. in keyexch_x25519()
236 * Although in practice you will generally not need to compare secrets in keyexch_x25519()
237 * produced through key exchange, if you do compare cryptographic secrets, in keyexch_x25519()
242 fprintf(stderr, "Negotiated secrets do not match\n"); in keyexch_x25519()
255 /* The secrets are sensitive, so ensure they are erased before freeing. */ in keyexch_x25519()
/third_party/littlefs/.github/workflows/
Dpost-release.yml18 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \
19 "$GITHUB_API_URL/repos/${{secrets.POST_RELEASE_REPO}}/dispatches" \
Dstatus.yml35 curl -sS -H "authorization: token ${{secrets.BOT_TOKEN}}" \
46 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \
Drelease.yml24 token: ${{secrets.BOT_TOKEN}}
182 git config user.name ${{secrets.BOT_USER}}
183 git config user.email ${{secrets.BOT_EMAIL}}
206 curl -sS -X POST -H "authorization: token ${{secrets.BOT_TOKEN}}" \
/third_party/rust/crates/pin-project-lite/.github/workflows/
Drelease.yml42 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
45 CARGO_REGISTRY_TOKEN: ${{ secrets.CARGO_REGISTRY_TOKEN }}
Dpr.yml19 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
/third_party/harfbuzz/.github/workflows/
Dcoverity-scan.yml21 TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
39 TOKEN: ${{ secrets.COVERITY_SCAN_TOKEN }}
Dlinux-ci.yml29 GH_TOKEN: ${{ secrets.GH_TOKEN }}
43 # github-token: ${{ secrets.PERSONAL_GITHUB_TOKEN }}
/third_party/mbedtls/docs/
Duse-psa-crypto.md43 Benefits: isolation of long-term secrets, use of PSA Crypto drivers.
73 Benefits: isolation of long-term secrets.
91 Benefits: use of PSA Crypto drivers; partial isolation of short-term secrets
/third_party/rust/crates/signal-hook/.github/workflows/
Daudit.yaml17 token: ${{ secrets.GITHUB_TOKEN }}
/third_party/node/tools/gyp/.github/workflows/
Drelease-please.yml13 token: ${{ secrets.GITHUB_TOKEN }}
/third_party/mbedtls/library/
Dssl_tls13_keys.h126 * from the client/server traffic secrets.
143 * \param secret_len Length of the secrets \p client_secret and
389 * the three main secrets during the handshake: The early
413 * Each of the three secrets in turn is the basis for further
417 * This function implements one step in this evolution of secrets:
/third_party/rust/crates/bindgen/.github/workflows/
Dsync-master-from-main.yml21 github_token: ${{ secrets.GITHUB_TOKEN }}
/third_party/typescript/.github/workflows/
Dtwoslash-repros.yaml23 github-token: ${{ secrets.TS_BOT_GITHUB_TOKEN }}
Dnightly.yaml32 NODE_AUTH_TOKEN: ${{secrets.npm_token}}
/third_party/flatbuffers/.github/workflows/
Dlabel.yml19 repo-token: "${{ secrets.GITHUB_TOKEN }}"
Dstale.yml15 repo-token: ${{ secrets.GITHUB_TOKEN }}
/third_party/rust/crates/once_cell/.github/workflows/
Dci.yaml27 CARGO_REGISTRY_TOKEN: ${{ secrets.CRATES_IO_TOKEN }}
/third_party/rust/crates/clap/.github/workflows/
Daudit.yml26 token: ${{ secrets.GITHUB_TOKEN }}
/third_party/rust/crates/tracing/.github/workflows/
Drelease.yml24 GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
/third_party/rust/crates/env_logger/.github/workflows/
Ddocs.yml39 github_token: ${{ secrets.GITHUB_TOKEN }}

123456