/aosp_15_r20/external/tink/java_src/src/test/java/com/google/crypto/tink/integration/gcpkms/ |
H A D | FakeCloudKmsTest.java | 23 import com.google.api.services.cloudkms.v1.CloudKMS; 24 import com.google.api.services.cloudkms.v1.model.DecryptRequest; 25 import com.google.api.services.cloudkms.v1.model.DecryptResponse; 26 import com.google.api.services.cloudkms.v1.model.EncryptRequest; 27 import com.google.api.services.cloudkms.v1.model.EncryptResponse; 50 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in testEncryptDecryptWithValidKeyId_success() 76 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in encryptEmptyData_decryptReturnsNull() 102 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in testEncryptWithUnknownKeyId_executeFails() 114 CloudKMS.Projects.Locations.KeyRings.CryptoKeys.Encrypt enc = in testEncryptWithUnknownKeyId_executeFails() 123 CloudKMS kms = new FakeCloudKms(asList(invalidId)); in testEncryptWithInvalidKeyId_encryptFails() [all …]
|
/aosp_15_r20/external/tink/java_src/src/main/java/com/google/crypto/tink/integration/gcpkms/ |
H A D | FakeCloudKms.java | 22 import com.google.api.services.cloudkms.v1.CloudKMS; 23 import com.google.api.services.cloudkms.v1.model.DecryptRequest; 24 import com.google.api.services.cloudkms.v1.model.DecryptResponse; 25 import com.google.api.services.cloudkms.v1.model.EncryptRequest; 26 import com.google.api.services.cloudkms.v1.model.EncryptResponse; 37 * A partial, fake implementation of {@link com.google.api.services.cloudkms.v1.CloudKMS}. 41 final class FakeCloudKms extends CloudKMS { 68 final class Projects extends CloudKMS.Projects { 77 final class Locations extends CloudKMS.Projects.Locations { 86 final class KeyRings extends CloudKMS.Projects.Locations.KeyRings { [all …]
|
H A D | GcpKmsClient.java | 23 import com.google.api.services.cloudkms.v1.CloudKMS; 24 import com.google.api.services.cloudkms.v1.CloudKMSScopes; 56 @Nullable private CloudKMS cloudKms; field in GcpKmsClient 119 this.cloudKms = in withCredentials() 120 new CloudKMS.Builder(new NetHttpTransport(), new GsonFactory(), credential) in withCredentials() 133 this.cloudKms = in withCredentials() 134 new CloudKMS.Builder( in withCredentials() 162 * Specifies the {@link com.google.api.services.cloudkms.v1.CloudKMS} object to be used. Only used 166 KmsClient withCloudKms(CloudKMS cloudKms) { in withCloudKms() argument 167 this.cloudKms = cloudKms; in withCloudKms() [all …]
|
H A D | GcpKmsAead.java | 19 import com.google.api.services.cloudkms.v1.CloudKMS; 20 import com.google.api.services.cloudkms.v1.model.DecryptRequest; 21 import com.google.api.services.cloudkms.v1.model.DecryptResponse; 22 import com.google.api.services.cloudkms.v1.model.EncryptRequest; 23 import com.google.api.services.cloudkms.v1.model.EncryptResponse; 39 private final CloudKMS kmsClient; 46 public GcpKmsAead(CloudKMS kmsClient, String keyName) { in GcpKmsAead()
|
/aosp_15_r20/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/ |
D | cloudkms.v1.json | 8 "https://www.googleapis.com/auth/cloudkms": { 15 "baseUrl": "https://cloudkms.googleapis.com/", 26 "id": "cloudkms:v1", 28 "mtlsRootUrl": "https://cloudkms.mtls.googleapis.com/", 29 "name": "cloudkms", 119 "id": "cloudkms.projects.locations.generateRandomBytes", 141 "https://www.googleapis.com/auth/cloudkms" 148 "id": "cloudkms.projects.locations.get", 167 "https://www.googleapis.com/auth/cloudkms" 174 "id": "cloudkms.projects.locations.list", [all …]
|
/aosp_15_r20/external/google-cloud-java/java-kms/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/ |
H A D | KmsProto.java | 207 + "parent\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapi" 214 + "A\002\372A#\n!cloudkms.googleapis.com/CryptoKey" 220 + "ent\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapis.c" 237 + "\004name\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapis" 239 + "ame\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.googleapis.c" 241 + "st\022>\n\004name\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googl" 246 + "cloudkms.googleapis.com/ImportJob\"\240\001\n\024Cr" 252 + "\'\340A\002\372A!\n\037cloudkms.googleapis.com/KeyRing" 257 + "\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.googlea" 261 + "est\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.go" [all …]
|
H A D | EkmServiceProto.java | 98 + "(\tB-\340A\002\372A\'\n%cloudkms.googleapis.com/EkmC" 136 + "\n\006MANUAL\020\001\022\r\n\tCLOUD_KMS\020\002:s\352Ap\n%cloudkms" 141 + "n\030\002 \001(\tB-\340A\001\372A\'\n%cloudkms.googleapis.com" 142 + "/EkmConnection:Y\352AV\n!cloudkms.googleapis" 174 + "mask\032t\312A\027cloudkms.googleapis.com\322AWhttps"
|
/aosp_15_r20/external/sdk-platform-java/test/integration/apis/kms/v1/ |
H A D | service.proto | 50 option (google.api.default_host) = "cloudkms.googleapis.com"; 53 "https://www.googleapis.com/auth/cloudkms"; 402 type: "cloudkms.googleapis.com/KeyRing" 444 type: "cloudkms.googleapis.com/CryptoKey" 485 type: "cloudkms.googleapis.com/KeyRing" 588 type: "cloudkms.googleapis.com/KeyRing" 601 type: "cloudkms.googleapis.com/CryptoKey" 614 type: "cloudkms.googleapis.com/CryptoKeyVersion" 627 type: "cloudkms.googleapis.com/CryptoKeyVersion" 640 type: "cloudkms.googleapis.com/ImportJob" [all …]
|
/aosp_15_r20/external/googleapis/google/cloud/kms/v1/ |
H A D | cloudkms_v1.yaml | 3 name: cloudkms.googleapis.com 94 https://www.googleapis.com/auth/cloudkms 99 https://www.googleapis.com/auth/cloudkms 104 https://www.googleapis.com/auth/cloudkms 109 https://www.googleapis.com/auth/cloudkms 114 https://www.googleapis.com/auth/cloudkms
|
H A D | ekm_service.proto | 44 option (google.api.default_host) = "cloudkms.googleapis.com"; 47 "https://www.googleapis.com/auth/cloudkms"; 183 type: "cloudkms.googleapis.com/EkmConnection" 230 type: "cloudkms.googleapis.com/EkmConfig" 297 type: "cloudkms.googleapis.com/EkmConnection" 416 type: "cloudkms.googleapis.com/EkmConfig" 431 type: "cloudkms.googleapis.com/EkmConnection" 444 type: "cloudkms.googleapis.com/EkmConnection"
|
H A D | service.proto | 48 option (google.api.default_host) = "cloudkms.googleapis.com"; 51 "https://www.googleapis.com/auth/cloudkms"; 454 type: "cloudkms.googleapis.com/KeyRing" 496 type: "cloudkms.googleapis.com/CryptoKey" 537 type: "cloudkms.googleapis.com/KeyRing" 640 type: "cloudkms.googleapis.com/KeyRing" 653 type: "cloudkms.googleapis.com/CryptoKey" 666 type: "cloudkms.googleapis.com/CryptoKeyVersion" 679 type: "cloudkms.googleapis.com/CryptoKeyVersion" 692 type: "cloudkms.googleapis.com/ImportJob" [all …]
|
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/ |
D | logging_v2.v2.html | 85 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte… 107 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 109 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 115 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte… 123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 138 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 140 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
|
D | logging_v2.organizations.html | 105 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte… 127 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 129 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 135 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte… 143 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 145 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 158 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 160 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
|
D | logging_v2.folders.locations.buckets.html | 123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… [all …]
|
D | logging_v2.organizations.locations.buckets.html | 123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… [all …]
|
D | logging_v2.projects.locations.buckets.html | 123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… [all …]
|
D | logging_v2.locations.buckets.html | 123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… [all …]
|
D | logging_v2.billingAccounts.locations.buckets.html | 120 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 122 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 147 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 149 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 202 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 204 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 247 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 249 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte… 274 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte… 276 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
|
/aosp_15_r20/external/google-cloud-java/java-kms/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/ |
H A D | service.proto | 48 option (google.api.default_host) = "cloudkms.googleapis.com"; 51 "https://www.googleapis.com/auth/cloudkms"; 430 type: "cloudkms.googleapis.com/KeyRing" 472 type: "cloudkms.googleapis.com/CryptoKey" 513 type: "cloudkms.googleapis.com/KeyRing" 616 type: "cloudkms.googleapis.com/KeyRing" 629 type: "cloudkms.googleapis.com/CryptoKey" 642 type: "cloudkms.googleapis.com/CryptoKeyVersion" 655 type: "cloudkms.googleapis.com/CryptoKeyVersion" 668 type: "cloudkms.googleapis.com/ImportJob" [all …]
|
H A D | ekm_service.proto | 44 option (google.api.default_host) = "cloudkms.googleapis.com"; 47 "https://www.googleapis.com/auth/cloudkms"; 170 type: "cloudkms.googleapis.com/EkmConnection" 217 type: "cloudkms.googleapis.com/EkmConfig" 284 type: "cloudkms.googleapis.com/EkmConnection" 403 type: "cloudkms.googleapis.com/EkmConfig" 418 type: "cloudkms.googleapis.com/EkmConnection"
|
/aosp_15_r20/external/tink/go/integration/gcpkms/ |
H A D | gcp_kms_aead.go | 22 "google.golang.org/api/cloudkms/v1" 30 kms cloudkms.Service 36 func newGCPAEAD(keyURI string, kms *cloudkms.Service) tink.AEAD { 46 req := &cloudkms.EncryptRequest{ 61 req := &cloudkms.DecryptRequest{
|
/aosp_15_r20/external/googleapis/google/spanner/admin/database/v1/ |
H A D | common.proto | 32 type: "cloudkms.googleapis.com/CryptoKey" 36 type: "cloudkms.googleapis.com/CryptoKeyVersion" 61 type: "cloudkms.googleapis.com/CryptoKey" 96 type: "cloudkms.googleapis.com/CryptoKeyVersion"
|
/aosp_15_r20/external/google-cloud-java/java-container/proto-google-cloud-container-v1beta1/src/main/java/com/google/container/v1beta1/ |
H A D | DatabaseEncryption.java | 238 * Name of CloudKMS key to use for the encryption of secrets in etcd. 262 * Name of CloudKMS key to use for the encryption of secrets in etcd. 689 * Name of CloudKMS key to use for the encryption of secrets in etcd. 712 * Name of CloudKMS key to use for the encryption of secrets in etcd. 735 * Name of CloudKMS key to use for the encryption of secrets in etcd. 757 * Name of CloudKMS key to use for the encryption of secrets in etcd. 775 * Name of CloudKMS key to use for the encryption of secrets in etcd.
|
/aosp_15_r20/external/google-cloud-java/java-container/proto-google-cloud-container-v1/src/main/java/com/google/container/v1/ |
H A D | DatabaseEncryption.java | 238 * Name of CloudKMS key to use for the encryption of secrets in etcd. 262 * Name of CloudKMS key to use for the encryption of secrets in etcd. 686 * Name of CloudKMS key to use for the encryption of secrets in etcd. 709 * Name of CloudKMS key to use for the encryption of secrets in etcd. 732 * Name of CloudKMS key to use for the encryption of secrets in etcd. 754 * Name of CloudKMS key to use for the encryption of secrets in etcd. 772 * Name of CloudKMS key to use for the encryption of secrets in etcd.
|
/aosp_15_r20/external/googleapis/google/cloud/kms/ |
H A D | BUILD.bazel | 16 # Generates a Ruby wrapper client for cloudkms. 27 "ruby-cloud-api-id=cloudkms.googleapis.com", 28 "ruby-cloud-api-shortname=cloudkms",
|