Home
last modified time | relevance | path

Searched full:secrets (Results 1 – 25 of 391) sorted by relevance

12345678910>>...16

/external/python/cpython3/Lib/test/
Dtest_secrets.py1 """Test the secrets module.
3 As most of the functions in secrets are thin wrappers around functions
8 import secrets
16 """Test secrets.compare_digest function."""
23 self.assertTrue(secrets.compare_digest(a, b))
24 self.assertTrue(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8')))
28 self.assertFalse(secrets.compare_digest("abc", "abcd"))
29 self.assertFalse(secrets.compare_digest(b"abc", b"abcd"))
33 self.assertFalse(secrets.compare_digest(a, b))
34 self.assertFalse(secrets.compare_digest(a.encode('utf-8'), b.encode('utf-8')))
[all …]
/external/python/cpython3/Doc/library/
Dsecrets.rst1 :mod:`secrets` --- Generate secure random numbers for managing secrets
4 .. module:: secrets
5 :synopsis: Generate secure random numbers for managing secrets.
13 from secrets import *
16 **Source code:** :source:`Lib/secrets.py`
20 The :mod:`secrets` module is used for generating cryptographically strong
22 authentication, security tokens, and related secrets.
24 In particular, :mod:`secrets` should be used in preference to the
36 The :mod:`secrets` module provides access to the most secure source of
61 The :mod:`secrets` module provides functions for generating secure
[all …]
/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/
Dsecretmanager.v1beta1.json180 "secrets": { object
184 "flatPath": "v1beta1/projects/{projectsId}/secrets/{secretsId}:addVersion",
186 "id": "secretmanager.projects.secrets.addVersion",
192 …urce name of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`.",
194 "pattern": "^projects/[^/]+/secrets/[^/]+$",
212 "flatPath": "v1beta1/projects/{projectsId}/secrets",
214 "id": "secretmanager.projects.secrets.create",
232 "path": "v1beta1/{+parent}/secrets",
245 "flatPath": "v1beta1/projects/{projectsId}/secrets/{secretsId}",
247 "id": "secretmanager.projects.secrets.delete",
[all …]
Dsecretmanager.v1.json180 "secrets": { object
184 "flatPath": "v1/projects/{projectsId}/secrets/{secretsId}:addVersion",
186 "id": "secretmanager.projects.secrets.addVersion",
192 …urce name of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`.",
194 "pattern": "^projects/[^/]+/secrets/[^/]+$",
212 "flatPath": "v1/projects/{projectsId}/secrets",
214 "id": "secretmanager.projects.secrets.create",
232 "path": "v1/{+parent}/secrets",
245 "flatPath": "v1/projects/{projectsId}/secrets/{secretsId}",
247 "id": "secretmanager.projects.secrets.delete",
[all …]
/external/bcc/.github/workflows/
Dpublish.yml15 # and add the secret token for it to GitHub secrets as:
42 QUAY_TOKEN: ${{ secrets.QUAY_TOKEN }}
48 QUAY_TOKEN: ${{ secrets.QUAY_TOKEN }}
71 # guarded by presence of all required github secrets.
72 # GitHub secrets can be configured as follows:
96 DOCKER_IMAGE: ${{ secrets.DOCKER_IMAGE }}
97 DOCKER_USERNAME: ${{ secrets.DOCKER_USERNAME }}
98 DOCKER_PASSWORD: ${{ secrets.DOCKER_PASSWORD }}
105 name: ${{ secrets.DOCKER_IMAGE }}
106 username: ${{ secrets.DOCKER_USERNAME }}
[all …]
/external/python/google-api-python-client/docs/dyn/
Dsecretmanager_v1beta1.projects.secrets.versions.html75 …a href="secretmanager_v1beta1.projects.secrets.html">secrets</a> . <a href="secretmanager_v1beta1.…
79 …Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/latest…
94 <p class="firstline">Gets metadata for a SecretVersion. `projects/*/secrets/*/versions/latest` is a…
104 …<pre>Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/l…
107 …name: string, Required. The resource name of the SecretVersion in the format `projects/*/secrets/*…
117 …ng&quot;, # The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`.
134 … resource name of the SecretVersion to destroy in the format `projects/*/secrets/*/versions/*`. (r…
152 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se…
162 … resource name of the SecretVersion to disable in the format `projects/*/secrets/*/versions/*`. (r…
180 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se…
[all …]
Dsecretmanager_v1.projects.secrets.versions.html75 …/a> . <a href="secretmanager_v1.projects.secrets.html">secrets</a> . <a href="secretmanager_v1.pro…
79 …Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/latest…
94 <p class="firstline">Gets metadata for a SecretVersion. `projects/*/secrets/*/versions/latest` is a…
104 …<pre>Accesses a SecretVersion. This call returns the secret data. `projects/*/secrets/*/versions/l…
107 …ce name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. `projects/*/secrets/…
117 …ng&quot;, # The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`.
134 … resource name of the SecretVersion to destroy in the format `projects/*/secrets/*/versions/*`. (r…
154 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se…
181 … resource name of the SecretVersion to disable in the format `projects/*/secrets/*/versions/*`. (r…
201 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se…
[all …]
Dsecretmanager_v1.projects.secrets.html75 …_v1.projects.html">projects</a> . <a href="secretmanager_v1.projects.secrets.html">secrets</a></h1>
78 <code><a href="secretmanager_v1.projects.secrets.versions.html">versions()</a></code>
102 <p class="firstline">Lists Secrets.</p>
121 … of the Secret to associate with the SecretVersion in the format `projects/*/secrets/*`. (required)
143 …t only. The resource name of the SecretVersion in the format `projects/*/secrets/*/versions/*`. Se…
186 … String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
190 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the…
197 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the…
232 … String&quot;, # Output only. The resource name of the Secret in the format `projects/*/secrets/*`.
236 …For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the…
[all …]
Dcloudbuild_v1.projects.githubEnterpriseConfigs.html117secrets&quot;: { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret…
222secrets&quot;: { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret…
261secrets&quot;: { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret…
294secrets&quot;: { # GitHubEnterpriseSecrets represents the names of all necessary secrets in Secret…
/external/google-java-format/.github/workflows/
Drelease.yml19 echo -e "${{ secrets.GPG_SIGNING_KEY }}" | gpg --batch --import --no-tty
21 …g --yes -v --output=/dev/null --pinentry-mode loopback --passphrase "${{ secrets.GPG_PASSPHRASE }}…
48 …git remote set-url origin https://${{ github.actor }}:${{ secrets.GITHUB_TOKEN }}@github.com/googl…
52 CI_DEPLOY_USERNAME: ${{ secrets.CI_DEPLOY_USERNAME }}
53 CI_DEPLOY_PASSWORD: ${{ secrets.CI_DEPLOY_PASSWORD }}
55 …lipse_plugin' -P sonatype-oss-release clean deploy -Dgpg.passphrase="${{ secrets.GPG_PASSPHRASE }}"
59 … 'eclipse_plugin' verify gpg:sign -DskipTests=true -Dgpg.passphrase="${{ secrets.GPG_PASSPHRASE }}"
/external/python/python-api-core/scripts/
Ddecrypt-secrets.sh28 [[ -f "testing/client-secrets.json" ]]; then
36 gcloud secrets versions access latest --secret="python-docs-samples-test-env" \
39 gcloud secrets versions access latest \
43 gcloud secrets versions access latest \
44 --secret="python-docs-samples-client-secrets" \
46 > testing/client-secrets.json
/external/python/google-api-python-client/scripts/
Ddecrypt-secrets.sh28 [[ -f "testing/client-secrets.json" ]]; then
36 gcloud secrets versions access latest --secret="python-docs-samples-test-env" \
39 gcloud secrets versions access latest \
43 gcloud secrets versions access latest \
44 --secret="python-docs-samples-client-secrets" \
46 > testing/client-secrets.json
/external/ktfmt/.github/workflows/
Dpublish_artifacts_on_release.yaml3 # About secrets used here:
28 cat <(echo -e "${{ secrets.OSSRH_GPG_SECRET_KEY }}") | gpg --batch --import
33 MAVEN_USERNAME: ${{ secrets.OSSRH_USERNAME }}
34 MAVEN_PASSWORD: ${{ secrets.OSSRH_TOKEN }}
39 -Dgpg.passphrase=${{ secrets.OSSRH_GPG_SECRET_KEY_PASSWORD }} \
47 JETBRAINS_MARKETPLACE_TOKEN: ${{ secrets.JETBRAINS_MARKETPLACE_TOKEN }}
/external/python/google-auth-library-python/scripts/
Ddecrypt-secrets.sh26 --key=kokoro-secrets \
27 --ciphertext-file=system_tests/secrets.tar.enc \
28 --plaintext-file=system_tests/secrets.tar
29 tar xvf system_tests/secrets.tar
30 rm system_tests/secrets.tar
Dencrypt-secrets.sh23 tar cvf system_tests/secrets.tar system_tests/data
28 --key=kokoro-secrets \
29 --plaintext-file=system_tests/secrets.tar \
30 --ciphertext-file=system_tests/secrets.tar.enc
32 rm system_tests/secrets.tar
Dtravis.sh25 # Decrypt secrets and run system tests if not on an external PR.
28 echo 'Extracting secrets.'
29 scripts/decrypt-secrets.sh "$SECRETS_PASSWORD"
35 echo 'In system test but secrets are not available, skipping.'
/external/python/google-auth-library-python/.kokoro/
Dtest-samples-impl.sh38 # Use secrets acessor service account to get secrets
48 # - testing/client-secrets.json
49 ./scripts/decrypt-secrets.sh
58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json
99 # Workaround for Kokoro permissions issue: delete secrets
100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
/external/python/google-api-python-client/.kokoro/
Dtest-samples-impl.sh38 # Use secrets acessor service account to get secrets
48 # - testing/client-secrets.json
49 ./scripts/decrypt-secrets.sh
58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json
99 # Workaround for Kokoro permissions issue: delete secrets
100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
/external/python/python-api-core/.kokoro/
Dtest-samples-impl.sh38 # Use secrets acessor service account to get secrets
48 # - testing/client-secrets.json
49 ./scripts/decrypt-secrets.sh
58 export GOOGLE_CLIENT_SECRETS=$(pwd)/testing/client-secrets.json
99 # Workaround for Kokoro permissions issue: delete secrets
100 rm testing/{test-env.sh,client-secrets.json,service-account.json}
/external/ppp/pppd/
Dpppd.8232 element of the list of allowed IP addresses in the secrets files (see
342 \fIporsche.Quotron.COM\fR for looking up secrets in the secrets file,
623 must have an entry in the /etc/ppp/pap\-secrets file as well as the
701 use lines in the secrets files which have \fIname\fR as the second
873 Indicates that all secrets in the /etc/ppp/pap\-secrets file which are
876 identical to the secret from the /etc/ppp/pap\-secrets file.
1218 if it has no secrets which could be used to do so.
1220 Pppd stores secrets for use in authentication in secrets
1221 files (/etc/ppp/pap\-secrets for PAP, /etc/ppp/chap\-secrets for CHAP,
1222 MS\-CHAP, MS\-CHAPv2, and EAP MD5-Challenge, and /etc/ppp/srp\-secrets
[all …]
Dsrp-entry.821 /etc/ppp/srp\-secrets file on a PPP EAP SRP\-SHA1 authenticator
23 authentication files, /etc/ppp/pap\-secrets and /etc/ppp/chap\-secrets.
54 .B /etc/ppp/srp\-secrets
/external/okio/.github/workflows/
Dbuild.yml104 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_USERNAME: ${{ secrets.SONATYPE_NEXUS_USERNAME }}
105 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_PASSWORD: ${{ secrets.SONATYPE_NEXUS_PASSWORD }}
125 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_USERNAME: ${{ secrets.SONATYPE_NEXUS_USERNAME }}
126 ORG_GRADLE_PROJECT_SONATYPE_NEXUS_PASSWORD: ${{ secrets.SONATYPE_NEXUS_PASSWORD }}
159 GITHUB_TOKEN: ${{ secrets.GH_CLIPPY_TOKEN }}
/external/tcpdump/tests/
Dcrypto.tests37 args => '-E "file @TESTDIR@/esp-secrets.txt"',
46 args => '-E "file @TESTDIR@/esp-secrets.txt"',
55 args => '-nnnn -E "file @TESTDIR@/esp-secrets.txt"',
64 args => '-v -v -v -v -E "file @TESTDIR@/ikev2pI2-secrets.txt"',
73 args => '-E "file @TESTDIR@/esp-secrets.txt"',
/external/python/oauth2client/oauth2client/
Dclientsecrets.py70 """Validate parsed client secrets from a file.
73 clientsecrets_dict: dict, a dictionary holding the client secrets.
143 client_type, client_info = loadfile('secrets.json')
146 client_type, client_info = loadfile('secrets.json', cache=memcache)
163 _SECRET_NAMESPACE = 'oauth2client:secrets#ns'
/external/lottie/
Ddecrypt.sh5 … $encrypted_7f6a0d70974a_key -iv $encrypted_7f6a0d70974a_iv -in secrets.tar.enc -out secrets.tar -d
6 tar xvf secrets.tar

12345678910>>...16