/external/python/cpython3/Lib/test/ |
D | test_secrets.py | 1 """Test the secrets module. 3 As most of the functions in secrets are thin wrappers around functions 8 import secrets 16 """Test secrets.compare_digest function.""" 23 self.assertTrue(secrets.compare_digest(a, b)) 24 self.assertTrue(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8'))) 28 self.assertFalse(secrets.compare_digest("abc", "abcd")) 29 self.assertFalse(secrets.compare_digest(b"abc", b"abcd")) 33 self.assertFalse(secrets.compare_digest(a, b)) 34 self.assertFalse(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8'))) [all …]
|
/external/python/cpython3/Doc/library/ |
D | secrets.rst | 1 :mod:`secrets` --- Generate secure random numbers for managing secrets 4 .. module:: secrets 5 :synopsis: Generate secure random numbers for managing secrets. 13 from secrets import * 16 **Source code:** :source:`Lib/secrets.py` 20 The :mod:`secrets` module is used for generating cryptographically strong 22 authentication, security tokens, and related secrets. 24 In particular, :mod:`secrets` should be used in preference to the 36 The :mod:`secrets` module provides access to the most secure source of 61 The :mod:`secrets` module provides functions for generating secure [all …]
|
/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/ |
D | secretmanager.v1beta1.json | 180 "secrets": { object 184 "flatPath": "v1beta1/projects/{projectsId}/secrets/{secretsId}:addVersion", 186 "id": "secretmanager.projects.secrets.addVersion", 192 …urce name of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`.", 194 "pattern": "^projects/[^/]+/secrets/[^/]+$", 212 "flatPath": "v1beta1/projects/{projectsId}/secrets", 214 "id": "secretmanager.projects.secrets.create", 232 "path": "v1beta1/{+parent}/secrets", 245 "flatPath": "v1beta1/projects/{projectsId}/secrets/{secretsId}", 247 "id": "secretmanager.projects.secrets.delete", [all …]
|
D | secretmanager.v1.json | 180 "secrets": { object 184 "flatPath": "v1/projects/{projectsId}/secrets/{secretsId}:addVersion", 186 "id": "secretmanager.projects.secrets.addVersion", 192 …urce name of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`.", 194 "pattern": "^projects/[^/]+/secrets/[^/]+$", 212 "flatPath": "v1/projects/{projectsId}/secrets", 214 "id": "secretmanager.projects.secrets.create", 232 "path": "v1/{+parent}/secrets", 245 "flatPath": "v1/projects/{projectsId}/secrets/{secretsId}", 247 "id": "secretmanager.projects.secrets.delete", [all …]
|
/external/bcc/.github/workflows/ |
D | publish.yml | 15 # and add the secret token for it to GitHub secrets as: 42 QUAY_TOKEN: ${{ secrets.QUAY_TOKEN }} 48 QUAY_TOKEN: ${{ secrets.QUAY_TOKEN }} 71 # guarded by presence of all required github secrets. 72 # GitHub secrets can be configured as follows: 96 DOCKER_IMAGE: ${{ secrets.DOCKER_IMAGE }} 97 DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }} 98 DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }} 105 name: ${{ secrets.DOCKER_IMAGE }} 106 username: ${{ secrets.DOCKER_USERNAME }} [all …]
|
/external/python/google-api-python-client/docs/dyn/ |
D | secretmanager_v1beta1.projects.secrets.versions.html | 75 …a href="secretmanager_v1beta1.projects.secrets.html">secrets</a> . <a href="secretmanager_v1beta1.… 79 …Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/latest… 94 <p class="firstline">Gets metadata for a SecretVersion. `projects/*/secrets/*/versions/latest` is a… 104 …<pre>Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/l… 107 …name: string, Required. The resource name of the SecretVersion in the format `projects/*/secrets/*… 117 …ng", # The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. 134 … resource name of the SecretVersion to destroy in the format `projects/*/secrets/*/versions/*`. (r… 152 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se… 162 … resource name of the SecretVersion to disable in the format `projects/*/secrets/*/versions/*`. (r… 180 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se… [all …]
|
D | secretmanager_v1.projects.secrets.versions.html | 75 …/a> . <a href="secretmanager_v1.projects.secrets.html">secrets</a> . <a href="secretmanager_v1.pro… 79 …Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/latest… 94 <p class="firstline">Gets metadata for a SecretVersion. `projects/*/secrets/*/versions/latest` is a… 104 …<pre>Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/l… 107 …ce name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. `projects/*/secrets/… 117 …ng", # The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. 134 … resource name of the SecretVersion to destroy in the format `projects/*/secrets/*/versions/*`. (r… 154 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se… 181 … resource name of the SecretVersion to disable in the format `projects/*/secrets/*/versions/*`. (r… 201 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se… [all …]
|
D | secretmanager_v1.projects.secrets.html | 75 …_v1.projects.html">projects</a> . <a href="secretmanager_v1.projects.secrets.html">secrets</a></h1> 78 <code><a href="secretmanager_v1.projects.secrets.versions.html">versions()</a></code> 102 <p class="firstline">Lists Secrets.</p> 121 … of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`. (required) 143 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se… 186 … String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`. 190 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the… 197 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the… 232 … String", # Output only. The resource name of the Secret in the format `projects/*/secrets/*`. 236 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the… [all …]
|
D | cloudbuild_v1.projects.githubEnterpriseConfigs.html | 117 …secrets": { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret… 222 …secrets": { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret… 261 …secrets": { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret… 294 …secrets": { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret…
|
/external/google-java-format/.github/workflows/ |
D | release.yml | 19 echo -e "${{ secrets.GPG_SIGNING_KEY }}" | gpg --batch --import --no-tty 21 …g --yes -v --output=/dev/null --pinentry-mode loopback --passphrase "${{ secrets.GPG_PASSPHRASE }}… 48 …git remote set-url origin https://${{ github.actor }}:${{ secrets.GITHUB_TOKEN }}@github.com/googl… 52 CI_DEPLOY_USERNAME: ${{ secrets.CI_DEPLOY_USERNAME }} 53 CI_DEPLOY_PASSWORD: ${{ secrets.CI_DEPLOY_PASSWORD }} 55 …lipse_plugin' -P sonatype-oss-release clean deploy -Dgpg.passphrase="${{ secrets.GPG_PASSPHRASE }}" 59 … 'eclipse_plugin' verify gpg:sign -DskipTests=true -Dgpg.passphrase="${{ secrets.GPG_PASSPHRASE }}"
|
/external/python/python-api-core/scripts/ |
D | decrypt-secrets.sh | 28 [[ -f "testing/client-secrets.json" ]]; then 36 gcloud secrets versions access latest --secret="python-docs-samples-test-env" \ 39 gcloud secrets versions access latest \ 43 gcloud secrets versions access latest \ 44 --secret="python-docs-samples-client-secrets" \ 46 > testing/client-secrets.json
|
/external/python/google-api-python-client/scripts/ |
D | decrypt-secrets.sh | 28 [[ -f "testing/client-secrets.json" ]]; then 36 gcloud secrets versions access latest --secret="python-docs-samples-test-env" \ 39 gcloud secrets versions access latest \ 43 gcloud secrets versions access latest \ 44 --secret="python-docs-samples-client-secrets" \ 46 > testing/client-secrets.json
|
/external/ktfmt/.github/workflows/ |
D | publish_artifacts_on_release.yaml | 3 # About secrets used here: 28 cat <(echo -e "${{ secrets.OSSRH_GPG_SECRET_KEY }}") | gpg --batch --import 33 MAVEN_USERNAME: ${{ secrets.OSSRH_USERNAME }} 34 MAVEN_PASSWORD: ${{ secrets.OSSRH_TOKEN }} 39 -Dgpg.passphrase=${{ secrets.OSSRH_GPG_SECRET_KEY_PASSWORD }} \ 47 JETBRAINS_MARKETPLACE_TOKEN: ${{ secrets.JETBRAINS_MARKETPLACE_TOKEN }}
|
/external/python/google-auth-library-python/scripts/ |
D | decrypt-secrets.sh | 26 --key=kokoro-secrets \ 27 --ciphertext-file=system_tests/secrets.tar.enc \ 28 --plaintext-file=system_tests/secrets.tar 29 tar xvf system_tests/secrets.tar 30 rm system_tests/secrets.tar
|
D | encrypt-secrets.sh | 23 tar cvf system_tests/secrets.tar system_tests/data 28 --key=kokoro-secrets \ 29 --plaintext-file=system_tests/secrets.tar \ 30 --ciphertext-file=system_tests/secrets.tar.enc 32 rm system_tests/secrets.tar
|
D | travis.sh | 25 # Decrypt secrets and run system tests if not on an external PR. 28 echo 'Extracting secrets.' 29 scripts/decrypt-secrets.sh "$SECRETS_PASSWORD" 35 echo 'In system test but secrets are not available, skipping.'
|
/external/python/google-auth-library-python/.kokoro/ |
D | test-samples-impl.sh | 38 # Use secrets acessor service account to get secrets 48 # - testing/client-secrets.json 49 ./scripts/decrypt-secrets.sh 58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json 99 # Workaround for Kokoro permissions issue: delete secrets 100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
|
/external/python/google-api-python-client/.kokoro/ |
D | test-samples-impl.sh | 38 # Use secrets acessor service account to get secrets 48 # - testing/client-secrets.json 49 ./scripts/decrypt-secrets.sh 58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json 99 # Workaround for Kokoro permissions issue: delete secrets 100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
|
/external/python/python-api-core/.kokoro/ |
D | test-samples-impl.sh | 38 # Use secrets acessor service account to get secrets 48 # - testing/client-secrets.json 49 ./scripts/decrypt-secrets.sh 58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json 99 # Workaround for Kokoro permissions issue: delete secrets 100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
|
/external/ppp/pppd/ |
D | pppd.8 | 232 element of the list of allowed IP addresses in the secrets files (see 342 \fIporsche.Quotron.COM\fR for looking up secrets in the secrets file, 623 must have an entry in the /etc/ppp/pap\-secrets file as well as the 701 use lines in the secrets files which have \fIname\fR as the second 873 Indicates that all secrets in the /etc/ppp/pap\-secrets file which are 876 identical to the secret from the /etc/ppp/pap\-secrets file. 1218 if it has no secrets which could be used to do so. 1220 Pppd stores secrets for use in authentication in secrets 1221 files (/etc/ppp/pap\-secrets for PAP, /etc/ppp/chap\-secrets for CHAP, 1222 MS\-CHAP, MS\-CHAPv2, and EAP MD5-Challenge, and /etc/ppp/srp\-secrets [all …]
|
D | srp-entry.8 | 21 /etc/ppp/srp\-secrets file on a PPP EAP SRP\-SHA1 authenticator 23 authentication files, /etc/ppp/pap\-secrets and /etc/ppp/chap\-secrets. 54 .B /etc/ppp/srp\-secrets
|
/external/okio/.github/workflows/ |
D | build.yml | 104 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_USERNAME: ${{ secrets.SONATYPE_NEXUS_USERNAME }} 105 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_PASSWORD: ${{ secrets.SONATYPE_NEXUS_PASSWORD }} 125 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_USERNAME: ${{ secrets.SONATYPE_NEXUS_USERNAME }} 126 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_PASSWORD: ${{ secrets.SONATYPE_NEXUS_PASSWORD }} 159 GITHUB_TOKEN: ${{ secrets.GH_CLIPPY_TOKEN }}
|
/external/tcpdump/tests/ |
D | crypto.tests | 37 args => '-E "file @TESTDIR@/esp-secrets.txt"', 46 args => '-E "file @TESTDIR@/esp-secrets.txt"', 55 args => '-nnnn -E "file @TESTDIR@/esp-secrets.txt"', 64 args => '-v -v -v -v -E "file @TESTDIR@/ikev2pI2-secrets.txt"', 73 args => '-E "file @TESTDIR@/esp-secrets.txt"',
|
/external/python/oauth2client/oauth2client/ |
D | clientsecrets.py | 70 """Validate parsed client secrets from a file. 73 clientsecrets_dict: dict, a dictionary holding the client secrets. 143 client_type, client_info = loadfile('secrets.json') 146 client_type, client_info = loadfile('secrets.json', cache=memcache) 163 _SECRET_NAMESPACE = 'oauth2client:secrets#ns'
|
/external/lottie/ |
D | decrypt.sh | 5 … $encrypted_7f6a0d70974a_key -iv $encrypted_7f6a0d70974a_iv -in secrets.tar.enc -out secrets.tar -d 6 tar xvf secrets.tar
|