| /external/aws-sdk-java-v2/services/secretsmanager/src/main/resources/codegen-resources/ |
| D | examples-1.json | 10 "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3", 19 …secret. The operation sets the RotationEnabled field to false and cancels all scheduled rotations.… 20 "id": "to-cancel-scheduled-rotation-for-a-secret-1523996016032", 21 "title": "To cancel scheduled rotation for a secret" 28 "Description": "My test database secret created with the CLI", 33 "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseSecret-a1b2c3", 43 …n": "The following example shows how to create a secret. The credentials stored in the encrypted s… 44 "id": "to-create-a-basic-secret-1523996473658", 45 "title": "To create a basic secret" 54 … "ARN": "arn:aws:secretsmanager:us-west-2:123456789012:secret:MyTestDatabaseMasterSecret-a1b2c3", [all …]
|
| /external/selinux/mcstrans/share/examples/default/ |
| D | setrans.conf | 16 # Secret with compartments A and B. 26 # Secret level with compartments 27 s2=Secret 33 s1-s2=Unclassified-Secret 36 # ranges for Secret with compartments 37 s0-s2=SystemLow-Secret 38 s0-s2:c0=SystemLow-Secret:A 39 s0-s2:c1=SystemLow-Secret:B 40 s0-s2:c0,c1=SystemLow-Secret:AB 41 s1-s2:c0=Unclassified-Secret:A [all …]
|
| D | default.test | 7 Secret==s2 12 Unclassified-Secret==s1-s2 15 SystemLow-Secret==s0-s2 16 SystemLow-Secret:A==s0-s2:c0 17 SystemLow-Secret:B==s0-s2:c1 18 SystemLow-Secret:AB==s0-s2:c0,c1 19 Unclassified-Secret:A==s1-s2:c0 20 Unclassified-Secret:B==s1-s2:c1 21 Unclassified-Secret:AB==s1-s2:c0,c1 22 Secret-Secret:A==s2-s2:c0 [all …]
|
| /external/selinux/mcstrans/share/examples/include/setrans.d/ |
| D | include-example | 16 # Secret with compartments A and B. 26 # Secret level with compartments 27 s2=Secret 33 s1-s2=Unclassified-Secret 36 # ranges for Secret with compartments 37 s0-s2=SystemLow-Secret 38 s0-s2:c0=SystemLow-Secret:A 39 s0-s2:c1=SystemLow-Secret:B 40 s0-s2:c0,c1=SystemLow-Secret:AB 41 s1-s2:c0=Unclassified-Secret:A [all …]
|
| /external/googleapis/google/cloud/secretmanager/v1beta2/ |
| D | resources.proto | 34 // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is a logical secret 37 // A [Secret][google.cloud.secretmanager.v1beta2.Secret] is made up of zero or 39 // represent the secret data. 40 message Secret { message 42 type: "secretmanager.googleapis.com/Secret" 43 pattern: "projects/{project}/secrets/{secret}" 44 pattern: "projects/{project}/locations/{location}/secrets/{secret}" 46 singular: "secret" 50 // [Secret][google.cloud.secretmanager.v1beta2.Secret] in the format 54 // Optional. Immutable. The replication policy of the secret data attached to [all …]
|
| /external/googleapis/google/cloud/secretmanager/v1/ |
| D | resources.proto | 34 // A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret whose 37 // A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or more 39 // the secret data. 40 message Secret { message 42 type: "secretmanager.googleapis.com/Secret" 43 pattern: "projects/{project}/secrets/{secret}" 44 pattern: "projects/{project}/locations/{location}/secrets/{secret}" 46 singular: "secret" 50 // [Secret][google.cloud.secretmanager.v1.Secret] in the format 54 // Optional. Immutable. The replication policy of the secret data attached to [all …]
|
| /external/selinux/mcstrans/share/examples/include/ |
| D | default.test | 7 Secret==s2 12 Unclassified-Secret==s1-s2 15 SystemLow-Secret==s0-s2 16 SystemLow-Secret:A==s0-s2:c0 17 SystemLow-Secret:B==s0-s2:c1 18 SystemLow-Secret:AB==s0-s2:c0,c1 19 Unclassified-Secret:A==s1-s2:c0 20 Unclassified-Secret:B==s1-s2:c1 21 Unclassified-Secret:AB==s1-s2:c0,c1 22 Secret-Secret:A==s2-s2:c0 [all …]
|
| /external/rust/android-crates-io/crates/twox-hash/src/xxhash3/ |
| D | streaming.rs | 5 /// A buffer containing the secret bytes. 12 /// A mutable buffer to contain the secret bytes. 44 /// Holds secret and temporary buffers that are ensured to be 49 secret: S, field 54 /// Returns the secret. 56 self.secret in into_secret() 64 /// Takes the seed, secret, and buffer and performs no 67 pub fn new(seed: u64, secret: S) -> Result<Self, SecretTooShortError<S>> { in new() 68 match Secret::new(secret.as_ref()) { in new() 71 secret, in new() [all …]
|
| /external/google-cloud-java/java-secretmanager/proto-google-cloud-secretmanager-v1/src/main/proto/google/cloud/secretmanager/v1/ |
| D | resources.proto | 34 // A [Secret][google.cloud.secretmanager.v1.Secret] is a logical secret whose 37 // A [Secret][google.cloud.secretmanager.v1.Secret] is made up of zero or more 39 // the secret data. 40 message Secret { message 42 type: "secretmanager.googleapis.com/Secret" 43 pattern: "projects/{project}/secrets/{secret}" 47 // [Secret][google.cloud.secretmanager.v1.Secret] in the format 51 // Required. Immutable. The replication policy of the secret data attached to 52 // the [Secret][google.cloud.secretmanager.v1.Secret]. 54 // The replication policy cannot be changed after the Secret has been created. [all …]
|
| D | service.proto | 39 // Secret Manager Service 44 // * [Secret][google.cloud.secretmanager.v1.Secret] 50 // Lists [Secrets][google.cloud.secretmanager.v1.Secret]. 58 …// Creates a new [Secret][google.cloud.secretmanager.v1.Secret] containing no [SecretVersions][goo… 59 rpc CreateSecret(CreateSecretRequest) returns (Secret) { 62 body: "secret" 64 option (google.api.method_signature) = "parent,secret_id,secret"; 67 …// Creates a new [SecretVersion][google.cloud.secretmanager.v1.SecretVersion] containing secret da… 68 // it to an existing [Secret][google.cloud.secretmanager.v1.Secret]. 77 // Gets metadata for a given [Secret][google.cloud.secretmanager.v1.Secret]. [all …]
|
| /external/google-cloud-java/java-secretmanager/proto-google-cloud-secretmanager-v1beta1/src/main/proto/google/cloud/secrets/v1beta1/ |
| D | resources.proto | 34 // A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can 37 // A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][goog… 38 // represent the secret data. 39 message Secret { message 41 type: "secretmanager.googleapis.com/Secret" 42 pattern: "projects/{project}/secrets/{secret}" 45 …// Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the form… 48 …mmutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.… 50 // The replication policy cannot be changed after the Secret has been created. 56 // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created. [all …]
|
| /external/googleapis/google/cloud/secrets/v1beta1/ |
| D | resources.proto | 33 // A [Secret][google.cloud.secrets.v1beta1.Secret] is a logical secret whose value and versions can 36 // A [Secret][google.cloud.secrets.v1beta1.Secret] is made up of zero or more [SecretVersions][goog… 37 // represent the secret data. 38 message Secret { message 40 type: "secretmanager.googleapis.com/Secret" 41 pattern: "projects/{project}/secrets/{secret}" 44 …// Output only. The resource name of the [Secret][google.cloud.secrets.v1beta1.Secret] in the form… 47 …mmutable. The replication policy of the secret data attached to the [Secret][google.cloud.secrets.… 49 // The replication policy cannot be changed after the Secret has been created. 55 // Output only. The time at which the [Secret][google.cloud.secrets.v1beta1.Secret] was created. [all …]
|
| /external/rust/android-crates-io/crates/twox-hash/src/ |
| D | xxhash3_64.rs | 38 /// Hash all data at once using the provided seed and a secret 44 let mut secret = DEFAULT_SECRET_RAW; in oneshot_with_seed() localVariable 46 // We know that the secret will only be used if we have more in oneshot_with_seed() 49 derive_secret(seed, &mut secret); in oneshot_with_seed() 52 let secret = Secret::new(&secret).expect("The default secret length is invalid"); in oneshot_with_seed() localVariable 54 impl_oneshot(secret, seed, input) in oneshot_with_seed() 57 /// Hash all data at once using the provided secret and the 61 pub fn oneshot_with_secret(secret: &[u8], input: &[u8]) -> Result<u64, OneshotWithSecretError> { in oneshot_with_secret() 62 let secret = Secret::new(secret).map_err(OneshotWithSecretError)?; in oneshot_with_secret() localVariable 63 Ok(impl_oneshot(secret, DEFAULT_SEED, input)) in oneshot_with_secret() [all …]
|
| D | xxhash3_128.rs | 37 /// Hash all data at once using the provided seed and a secret 43 let mut secret = DEFAULT_SECRET_RAW; in oneshot_with_seed() localVariable 45 // We know that the secret will only be used if we have more in oneshot_with_seed() 48 derive_secret(seed, &mut secret); in oneshot_with_seed() 51 let secret = Secret::new(&secret).expect("The default secret length is invalid"); in oneshot_with_seed() localVariable 53 impl_oneshot(secret, seed, input) in oneshot_with_seed() 56 /// Hash all data at once using the provided secret and the 61 secret: &[u8], in oneshot_with_secret() 64 let secret = Secret::new(secret).map_err(OneshotWithSecretError)?; in oneshot_with_secret() localVariable 65 Ok(impl_oneshot(secret, DEFAULT_SEED, input)) in oneshot_with_secret() [all …]
|
| /external/google-cloud-java/java-functions/proto-google-cloud-functions-v1/src/main/java/com/google/cloud/functions/v1/ |
| D | SecretVolumeOrBuilder.java | 30 * The path within the container to mount the secret volume. For example, 31 * setting the mount_path as `/etc/secrets` mounts the secret value files 47 * The path within the container to mount the secret volume. For example, 48 * setting the mount_path as `/etc/secrets` mounts the secret value files 66 * ID) of the project that contains the secret. If not set, it is 67 * populated with the function's project, assuming that the secret exists in 81 * ID) of the project that contains the secret. If not set, it is 82 * populated with the function's project, assuming that the secret exists in 96 * Name of the secret in Secret Manager (not the full resource name). 99 * <code>string secret = 3;</code> [all …]
|
| /external/google-cloud-java/java-functions/proto-google-cloud-functions-v2/src/main/java/com/google/cloud/functions/v2/ |
| D | SecretVolumeOrBuilder.java | 30 * The path within the container to mount the secret volume. For example, 31 * setting the mount_path as `/etc/secrets` would mount the secret value files 46 * The path within the container to mount the secret volume. For example, 47 * setting the mount_path as `/etc/secrets` would mount the secret value files 64 * ID) of the project that contains the secret. If not set, it is 65 * assumed that the secret is in the same project as the function. 78 * ID) of the project that contains the secret. If not set, it is 79 * assumed that the secret is in the same project as the function. 92 * Name of the secret in secret manager (not the full resource name). 95 * <code>string secret = 3;</code> [all …]
|
| /external/google-cloud-java/java-functions/proto-google-cloud-functions-v2alpha/src/main/java/com/google/cloud/functions/v2alpha/ |
| D | SecretVolumeOrBuilder.java | 30 * The path within the container to mount the secret volume. For example, 31 * setting the mount_path as `/etc/secrets` would mount the secret value files 46 * The path within the container to mount the secret volume. For example, 47 * setting the mount_path as `/etc/secrets` would mount the secret value files 64 * ID) of the project that contains the secret. If not set, it is 65 * assumed that the secret is in the same project as the function. 78 * ID) of the project that contains the secret. If not set, it is 79 * assumed that the secret is in the same project as the function. 92 * Name of the secret in secret manager (not the full resource name). 95 * <code>string secret = 3;</code> [all …]
|
| /external/google-cloud-java/java-functions/proto-google-cloud-functions-v2beta/src/main/java/com/google/cloud/functions/v2beta/ |
| D | SecretVolumeOrBuilder.java | 30 * The path within the container to mount the secret volume. For example, 31 * setting the mount_path as `/etc/secrets` would mount the secret value files 46 * The path within the container to mount the secret volume. For example, 47 * setting the mount_path as `/etc/secrets` would mount the secret value files 64 * ID) of the project that contains the secret. If not set, it is 65 * assumed that the secret is in the same project as the function. 78 * ID) of the project that contains the secret. If not set, it is 79 * assumed that the secret is in the same project as the function. 92 * Name of the secret in secret manager (not the full resource name). 95 * <code>string secret = 3;</code> [all …]
|
| /external/scapy/scapy/layers/tls/crypto/ |
| D | prf.py | 21 def _tls_P_hash(secret, seed, req_len, hm): argument 27 - secret : the key to be used. If RFC 4868 is to be believed, 43 a = hm(secret).digest(seed) # A(1) 46 res += hm(secret).digest(a + seed) 47 a = hm(secret).digest(a) 53 def _tls_P_MD5(secret, seed, req_len): argument 54 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-MD5"]) 57 def _tls_P_SHA1(secret, seed, req_len): argument 58 return _tls_P_hash(secret, seed, req_len, _tls_hmac_algs["HMAC-SHA"]) 61 def _tls_P_SHA256(secret, seed, req_len): argument [all …]
|
| /external/google-cloud-java/java-secretmanager/google-cloud-secretmanager/src/main/java/com/google/cloud/secretmanager/v1beta1/ |
| D | SecretManagerServiceClient.java | 45 * Service Description: Secret Manager Service 51 * <li>[Secret][google.cloud.secrets.v1beta1.Secret] 63 * Secret secret = Secret.newBuilder().build(); 64 * Secret response = secretManagerServiceClient.createSecret(parent, secretId, secret); 173 * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 181 * for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { 188 * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. 201 * Lists [Secrets][google.cloud.secrets.v1beta1.Secret]. 209 * for (Secret element : secretManagerServiceClient.listSecrets(parent).iterateAll()) { 216 * [Secrets][google.cloud.secrets.v1beta1.Secret], in the format `projects/*`. [all …]
|
| /external/python/google-api-python-client/docs/dyn/ |
| D | secretmanager_v1.projects.secrets.html | 75 <h1><a href="secretmanager_v1.html">Secret Manager API</a> . <a href="secretmanager_v1.projects.htm… 84 …="firstline">Creates a new SecretVersion containing secret data and attaches it to an existing Sec… 90 <p class="firstline">Creates a new Secret containing no SecretVersions.</p> 93 <p class="firstline">Deletes a Secret.</p> 96 <p class="firstline">Gets metadata for a given Secret.</p> 99 …class="firstline">Gets the access control policy for a secret. Returns empty policy if the secret … 108 <p class="firstline">Updates metadata of an existing Secret.</p> 111 …specified secret. Replaces any existing policy. Permissions on SecretVersions are enforced accordi… 114 <p class="firstline">Returns permissions that a caller has for the specified secret. If the secret … 118 <pre>Creates a new SecretVersion containing secret data and attaches it to an existing Secret. [all …]
|
| /external/openthread/third_party/mbedtls/repo/library/ |
| D | ssl_tls13_keys.h | 86 * HKDF-Expand-Label( Secret, Label, Context, Length ) = 87 * HKDF-Expand( Secret, HkdfLabel, Length ) 91 * \param secret The \c Secret argument to \c HKDF-Expand-Label. 94 * \param secret_len The length of \p secret in Bytes. 102 * \param buf The destination buffer to hold the expanded secret. 104 * \param buf_len The desired size of the expanded secret in Bytes. 113 const unsigned char *secret, size_t secret_len, 126 * [sender]_write_key = HKDF-Expand-Label(Secret, "key", "", key_length) 127 * [sender]_write_iv = HKDF-Expand-Label(Secret, "iv", "", iv_length)* 131 * for the HKDF-based expansion of the secret. [all …]
|
| /external/mbedtls/library/ |
| D | ssl_tls13_keys.h | 86 * HKDF-Expand-Label( Secret, Label, Context, Length ) = 87 * HKDF-Expand( Secret, HkdfLabel, Length ) 91 * \param secret The \c Secret argument to \c HKDF-Expand-Label. 94 * \param secret_len The length of \p secret in Bytes. 102 * \param buf The destination buffer to hold the expanded secret. 104 * \param buf_len The desired size of the expanded secret in Bytes. 113 const unsigned char *secret, size_t secret_len, 126 * [sender]_write_key = HKDF-Expand-Label(Secret, "key", "", key_length) 127 * [sender]_write_iv = HKDF-Expand-Label(Secret, "iv", "", iv_length)* 131 * for the HKDF-based expansion of the secret. [all …]
|
| /external/google-cloud-java/java-dataproc-metastore/proto-google-cloud-dataproc-metastore-v1alpha/src/main/java/com/google/cloud/metastore/v1alpha/ |
| D | Secret.java | 28 * Protobuf type {@code google.cloud.metastore.v1alpha.Secret} 30 public final class Secret extends com.google.protobuf.GeneratedMessageV3 class 32 // @@protoc_insertion_point(message_implements:google.cloud.metastore.v1alpha.Secret) 35 // Use Secret.newBuilder() to construct. 36 private Secret(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Secret() method in Secret 40 private Secret() {} in Secret() method in Secret 45 return new Secret(); in newInstance() 64 com.google.cloud.metastore.v1alpha.Secret.class, in internalGetFieldAccessorTable() 65 com.google.cloud.metastore.v1alpha.Secret.Builder.class); in internalGetFieldAccessorTable() 117 * The relative resource name of a Secret Manager secret version, in the [all …]
|
| /external/google-cloud-java/java-dataproc-metastore/proto-google-cloud-dataproc-metastore-v1beta/src/main/java/com/google/cloud/metastore/v1beta/ |
| D | Secret.java | 28 * Protobuf type {@code google.cloud.metastore.v1beta.Secret} 30 public final class Secret extends com.google.protobuf.GeneratedMessageV3 class 32 // @@protoc_insertion_point(message_implements:google.cloud.metastore.v1beta.Secret) 35 // Use Secret.newBuilder() to construct. 36 private Secret(com.google.protobuf.GeneratedMessageV3.Builder<?> builder) { in Secret() method in Secret 40 private Secret() {} in Secret() method in Secret 45 return new Secret(); in newInstance() 64 com.google.cloud.metastore.v1beta.Secret.class, in internalGetFieldAccessorTable() 65 com.google.cloud.metastore.v1beta.Secret.Builder.class); in internalGetFieldAccessorTable() 117 * The relative resource name of a Secret Manager secret version, in the [all …]
|