Home
last modified time | relevance | path

Searched full:secret (Results 1 – 25 of 3156) sorted by relevance

12345678910>>...127

/external/aws-sdk-java-v2/services/secretsmanager/src/main/resources/codegen-resources/
Dexamples-1.json10 "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
19secret. The operation sets the RotationEnabled field to false and cancels all scheduled rotations.…
20 "id": "to-cancel-scheduled-rotation-for-a-secret-1523996016032",
21 "title": "To cancel scheduled rotation for a secret"
28 "Description": "My test database secret created with the CLI",
33 "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3",
43 …n": "The following example shows how to create a secret. The credentials stored in the encrypted s…
44 "id": "to-create-a-basic-secret-1523996473658",
45 "title": "To create a basic secret"
54 … "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseMasterSecret-a1b2c3",
[all …]
/external/selinux/mcstrans/share/examples/default/
Dsetrans.conf16 # Secret with compartments A and B.
26 # Secret level with compartments
27 s2=Secret
33 s1-s2=Unclassified-Secret
36 # ranges for Secret with compartments
37 s0-s2=SystemLow-Secret
38 s0-s2:c0=SystemLow-Secret:A
39 s0-s2:c1=SystemLow-Secret:B
40 s0-s2:c0,c1=SystemLow-Secret:AB
41 s1-s2:c0=Unclassified-Secret:A
[all …]
Ddefault.test7 Secret==s2
12 Unclassified-Secret==s1-s2
15 SystemLow-Secret==s0-s2
16 SystemLow-Secret:A==s0-s2:c0
17 SystemLow-Secret:B==s0-s2:c1
18 SystemLow-Secret:AB==s0-s2:c0,c1
19 Unclassified-Secret:A==s1-s2:c0
20 Unclassified-Secret:B==s1-s2:c1
21 Unclassified-Secret:AB==s1-s2:c0,c1
22 Secret-Secret:A==s2-s2:c0
[all …]
/external/selinux/mcstrans/share/examples/include/setrans.d/
Dinclude-example16 # Secret with compartments A and B.
26 # Secret level with compartments
27 s2=Secret
33 s1-s2=Unclassified-Secret
36 # ranges for Secret with compartments
37 s0-s2=SystemLow-Secret
38 s0-s2:c0=SystemLow-Secret:A
39 s0-s2:c1=SystemLow-Secret:B
40 s0-s2:c0,c1=SystemLow-Secret:AB
41 s1-s2:c0=Unclassified-Secret:A
[all …]
/external/googleapis/google/cloud/secretmanager/v1beta2/
Dresources.proto34 // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is a logical secret
37 // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is made up of zero or
39 // represent the secret data.
40 message Secret { message
42 type: "secretmanager.googleapis.com/Secret"
43 pattern: "projects/{project}/secrets/{secret}"
44 pattern: "projects/{project}/locations/{location}/secrets/{secret}"
46 singular: "secret"
50 // [Secret][google.cloud.secretmanager.v1beta2.Secret] in the format
54 // Optional. Immutable. The replication policy of the secret data attached to
[all …]
/external/googleapis/google/cloud/secretmanager/v1/
Dresources.proto34 // A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret whose
37 // A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or more
39 // the secret data.
40 message Secret { message
42 type: "secretmanager.googleapis.com/Secret"
43 pattern: "projects/{project}/secrets/{secret}"
44 pattern: "projects/{project}/locations/{location}/secrets/{secret}"
46 singular: "secret"
50 // [Secret][google.cloud.secretmanager.v1.Secret] in the format
54 // Optional. Immutable. The replication policy of the secret data attached to
[all …]
/external/selinux/mcstrans/share/examples/include/
Ddefault.test7 Secret==s2
12 Unclassified-Secret==s1-s2
15 SystemLow-Secret==s0-s2
16 SystemLow-Secret:A==s0-s2:c0
17 SystemLow-Secret:B==s0-s2:c1
18 SystemLow-Secret:AB==s0-s2:c0,c1
19 Unclassified-Secret:A==s1-s2:c0
20 Unclassified-Secret:B==s1-s2:c1
21 Unclassified-Secret:AB==s1-s2:c0,c1
22 Secret-Secret:A==s2-s2:c0
[all …]
/external/rust/android-crates-io/crates/twox-hash/src/xxhash3/
Dstreaming.rs5 /// A buffer containing the secret bytes.
12 /// A mutable buffer to contain the secret bytes.
44 /// Holds secret and temporary buffers that are ensured to be
49 secret: S, field
54 /// Returns the secret.
56 self.secret in into_secret()
64 /// Takes the seed, secret, and buffer and performs no
67 pub fn new(seed: u64, secret: S) -> Result<Self, SecretTooShortError<S>> { in new()
68 match Secret::new(secret.as_ref()) { in new()
71 secret, in new()
[all …]
/external/google-cloud-java/java-secretmanager/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/
Dresources.proto34 // A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret whose
37 // A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or more
39 // the secret data.
40 message Secret { message
42 type: "secretmanager.googleapis.com/Secret"
43 pattern: "projects/{project}/secrets/{secret}"
47 // [Secret][google.cloud.secretmanager.v1.Secret] in the format
51 // Required. Immutable. The replication policy of the secret data attached to
52 // the [Secret][google.cloud.secretmanager.v1.Secret].
54 // The replication policy cannot be changed after the Secret has been created.
[all …]
Dservice.proto39 // Secret Manager Service
44 // * [Secret][google.cloud.secretmanager.v1.Secret]
50 // Lists [Secrets][google.cloud.secretmanager.v1.Secret].
58 …// Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][goo…
59 rpc CreateSecret(CreateSecretRequest) returns (Secret) {
62 body: "secret"
64 option (google.api.method_signature) = "parent,secret_id,secret";
67 …// Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret da…
68 // it to an existing [Secret][google.cloud.secretmanager.v1.Secret].
77 // Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret].
[all …]
/external/google-cloud-java/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/
Dresources.proto34 // A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
37 // A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][goog…
38 // represent the secret data.
39 message Secret { message
41 type: "secretmanager.googleapis.com/Secret"
42 pattern: "projects/{project}/secrets/{secret}"
45 …// Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the form…
48 …mmutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.…
50 // The replication policy cannot be changed after the Secret has been created.
56 // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
[all …]
/external/googleapis/google/cloud/secrets/v1beta1/
Dresources.proto33 // A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can
36 // A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][goog…
37 // represent the secret data.
38 message Secret { message
40 type: "secretmanager.googleapis.com/Secret"
41 pattern: "projects/{project}/secrets/{secret}"
44 …// Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the form…
47 …mmutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.…
49 // The replication policy cannot be changed after the Secret has been created.
55 // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created.
[all …]
/external/rust/android-crates-io/crates/twox-hash/src/
Dxxhash3_64.rs38 /// Hash all data at once using the provided seed and a secret
44 let mut secret = DEFAULT_SECRET_RAW; in oneshot_with_seed() localVariable
46 // We know that the secret will only be used if we have more in oneshot_with_seed()
49 derive_secret(seed, &mut secret); in oneshot_with_seed()
52 let secret = Secret::new(&secret).expect("The default secret length is invalid"); in oneshot_with_seed() localVariable
54 impl_oneshot(secret, seed, input) in oneshot_with_seed()
57 /// Hash all data at once using the provided secret and the
61 pub fn oneshot_with_secret(secret: &[u8], input: &[u8]) -> Result<u64, OneshotWithSecretError> { in oneshot_with_secret()
62 let secret = Secret::new(secret).map_err(OneshotWithSecretError)?; in oneshot_with_secret() localVariable
63 Ok(impl_oneshot(secret, DEFAULT_SEED, input)) in oneshot_with_secret()
[all …]
Dxxhash3_128.rs37 /// Hash all data at once using the provided seed and a secret
43 let mut secret = DEFAULT_SECRET_RAW; in oneshot_with_seed() localVariable
45 // We know that the secret will only be used if we have more in oneshot_with_seed()
48 derive_secret(seed, &mut secret); in oneshot_with_seed()
51 let secret = Secret::new(&secret).expect("The default secret length is invalid"); in oneshot_with_seed() localVariable
53 impl_oneshot(secret, seed, input) in oneshot_with_seed()
56 /// Hash all data at once using the provided secret and the
61 secret: &[u8], in oneshot_with_secret()
64 let secret = Secret::new(secret).map_err(OneshotWithSecretError)?; in oneshot_with_secret() localVariable
65 Ok(impl_oneshot(secret, DEFAULT_SEED, input)) in oneshot_with_secret()
[all …]
/external/google-cloud-java/java-functions/proto-google-cloud-functions-v1/src/main/java/com/google/cloud/functions/v1/
DSecretVolumeOrBuilder.java30 * The path within the container to mount the secret volume. For example,
31 * setting the mount_path as `/etc/secrets` mounts the secret value files
47 * The path within the container to mount the secret volume. For example,
48 * setting the mount_path as `/etc/secrets` mounts the secret value files
66 * ID) of the project that contains the secret. If not set, it is
67 * populated with the function's project, assuming that the secret exists in
81 * ID) of the project that contains the secret. If not set, it is
82 * populated with the function's project, assuming that the secret exists in
96 * Name of the secret in Secret Manager (not the full resource name).
99 * <code>string secret = 3;</code>
[all …]
/external/google-cloud-java/java-functions/proto-google-cloud-functions-v2/src/main/java/com/google/cloud/functions/v2/
DSecretVolumeOrBuilder.java30 * The path within the container to mount the secret volume. For example,
31 * setting the mount_path as `/etc/secrets` would mount the secret value files
46 * The path within the container to mount the secret volume. For example,
47 * setting the mount_path as `/etc/secrets` would mount the secret value files
64 * ID) of the project that contains the secret. If not set, it is
65 * assumed that the secret is in the same project as the function.
78 * ID) of the project that contains the secret. If not set, it is
79 * assumed that the secret is in the same project as the function.
92 * Name of the secret in secret manager (not the full resource name).
95 * <code>string secret = 3;</code>
[all …]
/external/google-cloud-java/java-functions/proto-google-cloud-functions-v2alpha/src/main/java/com/google/cloud/functions/v2alpha/
DSecretVolumeOrBuilder.java30 * The path within the container to mount the secret volume. For example,
31 * setting the mount_path as `/etc/secrets` would mount the secret value files
46 * The path within the container to mount the secret volume. For example,
47 * setting the mount_path as `/etc/secrets` would mount the secret value files
64 * ID) of the project that contains the secret. If not set, it is
65 * assumed that the secret is in the same project as the function.
78 * ID) of the project that contains the secret. If not set, it is
79 * assumed that the secret is in the same project as the function.
92 * Name of the secret in secret manager (not the full resource name).
95 * <code>string secret = 3;</code>
[all …]
/external/google-cloud-java/java-functions/proto-google-cloud-functions-v2beta/src/main/java/com/google/cloud/functions/v2beta/
DSecretVolumeOrBuilder.java30 * The path within the container to mount the secret volume. For example,
31 * setting the mount_path as `/etc/secrets` would mount the secret value files
46 * The path within the container to mount the secret volume. For example,
47 * setting the mount_path as `/etc/secrets` would mount the secret value files
64 * ID) of the project that contains the secret. If not set, it is
65 * assumed that the secret is in the same project as the function.
78 * ID) of the project that contains the secret. If not set, it is
79 * assumed that the secret is in the same project as the function.
92 * Name of the secret in secret manager (not the full resource name).
95 * <code>string secret = 3;</code>
[all …]
/external/scapy/scapy/layers/tls/crypto/
Dprf.py21 def _tls_P_hash(secret, seed, req_len, hm): argument
27 - secret : the key to be used. If RFC 4868 is to be believed,
43 a = hm(secret).digest(seed) # A(1)
46 res += hm(secret).digest(a + seed)
47 a = hm(secret).digest(a)
53 def _tls_P_MD5(secret, seed, req_len): argument
54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"])
57 def _tls_P_SHA1(secret, seed, req_len): argument
58 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"])
61 def _tls_P_SHA256(secret, seed, req_len): argument
[all …]
/external/google-cloud-java/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/
DSecretManagerServiceClient.java45 * Service Description: Secret Manager Service
51 * <li>[Secret][google.cloud.secrets.v1beta1.Secret]
63 * Secret secret = Secret.newBuilder().build();
64 * Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret);
173 * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
181 * for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) {
188 * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/&#42;`.
201 * Lists [Secrets][google.cloud.secrets.v1beta1.Secret].
209 * for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) {
216 * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/&#42;`.
[all …]
/external/python/google-api-python-client/docs/dyn/
Dsecretmanager_v1.projects.secrets.html75 <h1><a href="secretmanager_v1.html">Secret Manager API</a> . <a href="secretmanager_v1.projects.htm…
84 …="firstline">Creates a new SecretVersion containing secret data and attaches it to an existing Sec…
90 <p class="firstline">Creates a new Secret containing no SecretVersions.</p>
93 <p class="firstline">Deletes a Secret.</p>
96 <p class="firstline">Gets metadata for a given Secret.</p>
99 …class="firstline">Gets the access control policy for a secret. Returns empty policy if the secret
108 <p class="firstline">Updates metadata of an existing Secret.</p>
111 …specified secret. Replaces any existing policy. Permissions on SecretVersions are enforced accordi…
114 <p class="firstline">Returns permissions that a caller has for the specified secret. If the secret
118 <pre>Creates a new SecretVersion containing secret data and attaches it to an existing Secret.
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dssl_tls13_keys.h86 * HKDF-Expand-Label( Secret, Label, Context, Length ) =
87 * HKDF-Expand( Secret, HkdfLabel, Length )
91 * \param secret The \c Secret argument to \c HKDF-Expand-Label.
94 * \param secret_len The length of \p secret in Bytes.
102 * \param buf The destination buffer to hold the expanded secret.
104 * \param buf_len The desired size of the expanded secret in Bytes.
113 const unsigned char *secret, size_t secret_len,
126 * [sender]_write_key = HKDF-Expand-Label(Secret, "key", "", key_length)
127 * [sender]_write_iv = HKDF-Expand-Label(Secret, "iv", "", iv_length)*
131 * for the HKDF-based expansion of the secret.
[all …]
/external/mbedtls/library/
Dssl_tls13_keys.h86 * HKDF-Expand-Label( Secret, Label, Context, Length ) =
87 * HKDF-Expand( Secret, HkdfLabel, Length )
91 * \param secret The \c Secret argument to \c HKDF-Expand-Label.
94 * \param secret_len The length of \p secret in Bytes.
102 * \param buf The destination buffer to hold the expanded secret.
104 * \param buf_len The desired size of the expanded secret in Bytes.
113 const unsigned char *secret, size_t secret_len,
126 * [sender]_write_key = HKDF-Expand-Label(Secret, "key", "", key_length)
127 * [sender]_write_iv = HKDF-Expand-Label(Secret, "iv", "", iv_length)*
131 * for the HKDF-based expansion of the secret.
[all …]
/external/google-cloud-java/java-dataproc-metastore/proto-google-cloud-dataproc-metastore-v1alpha/src/main/java/com/google/cloud/metastore/v1alpha/
DSecret.java28 * Protobuf type {@code google.cloud.metastore.v1alpha.Secret}
30 public final class Secret extends com.google.protobuf.GeneratedMessageV3 class
32 // @@protoc_insertion_point(message_implements:google.cloud.metastore.v1alpha.Secret)
35 // Use Secret.newBuilder() to construct.
36 private Secret(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Secret() method in Secret
40 private Secret() {} in Secret() method in Secret
45 return new Secret(); in newInstance()
64 com.google.cloud.metastore.v1alpha.Secret.class, in internalGetFieldAccessorTable()
65 com.google.cloud.metastore.v1alpha.Secret.Builder.class); in internalGetFieldAccessorTable()
117 * The relative resource name of a Secret Manager secret version, in the
[all …]
/external/google-cloud-java/java-dataproc-metastore/proto-google-cloud-dataproc-metastore-v1beta/src/main/java/com/google/cloud/metastore/v1beta/
DSecret.java28 * Protobuf type {@code google.cloud.metastore.v1beta.Secret}
30 public final class Secret extends com.google.protobuf.GeneratedMessageV3 class
32 // @@protoc_insertion_point(message_implements:google.cloud.metastore.v1beta.Secret)
35 // Use Secret.newBuilder() to construct.
36 private Secret(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Secret() method in Secret
40 private Secret() {} in Secret() method in Secret
45 return new Secret(); in newInstance()
64 com.google.cloud.metastore.v1beta.Secret.class, in internalGetFieldAccessorTable()
65 com.google.cloud.metastore.v1beta.Secret.Builder.class); in internalGetFieldAccessorTable()
117 * The relative resource name of a Secret Manager secret version, in the
[all …]

12345678910>>...127