Home
last modified time | relevance | path

Searched full:cloudkms (Results 1 – 25 of 182) sorted by relevance

12345678

/aosp_15_r20/external/tink/java_src/src/test/java/com/google/crypto/tink/integration/gcpkms/
H A DFakeCloudKmsTest.java23 import com.google.api.services.cloudkms.v1.CloudKMS;
24 import com.google.api.services.cloudkms.v1.model.DecryptRequest;
25 import com.google.api.services.cloudkms.v1.model.DecryptResponse;
26 import com.google.api.services.cloudkms.v1.model.EncryptRequest;
27 import com.google.api.services.cloudkms.v1.model.EncryptResponse;
50 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in testEncryptDecryptWithValidKeyId_success()
76 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in encryptEmptyData_decryptReturnsNull()
102 CloudKMS kms = new FakeCloudKms(asList(KEY_ID)); in testEncryptWithUnknownKeyId_executeFails()
114 CloudKMS.Projects.Locations.KeyRings.CryptoKeys.Encrypt enc = in testEncryptWithUnknownKeyId_executeFails()
123 CloudKMS kms = new FakeCloudKms(asList(invalidId)); in testEncryptWithInvalidKeyId_encryptFails()
[all …]
/aosp_15_r20/external/tink/java_src/src/main/java/com/google/crypto/tink/integration/gcpkms/
H A DFakeCloudKms.java22 import com.google.api.services.cloudkms.v1.CloudKMS;
23 import com.google.api.services.cloudkms.v1.model.DecryptRequest;
24 import com.google.api.services.cloudkms.v1.model.DecryptResponse;
25 import com.google.api.services.cloudkms.v1.model.EncryptRequest;
26 import com.google.api.services.cloudkms.v1.model.EncryptResponse;
37 * A partial, fake implementation of {@link com.google.api.services.cloudkms.v1.CloudKMS}.
41 final class FakeCloudKms extends CloudKMS {
68 final class Projects extends CloudKMS.Projects {
77 final class Locations extends CloudKMS.Projects.Locations {
86 final class KeyRings extends CloudKMS.Projects.Locations.KeyRings {
[all …]
H A DGcpKmsClient.java23 import com.google.api.services.cloudkms.v1.CloudKMS;
24 import com.google.api.services.cloudkms.v1.CloudKMSScopes;
56 @Nullable private CloudKMS cloudKms; field in GcpKmsClient
119 this.cloudKms = in withCredentials()
120 new CloudKMS.Builder(new NetHttpTransport(), new GsonFactory(), credential) in withCredentials()
133 this.cloudKms = in withCredentials()
134 new CloudKMS.Builder( in withCredentials()
162 * Specifies the {@link com.google.api.services.cloudkms.v1.CloudKMS} object to be used. Only used
166 KmsClient withCloudKms(CloudKMS cloudKms) { in withCloudKms() argument
167 this.cloudKms = cloudKms; in withCloudKms()
[all …]
H A DGcpKmsAead.java19 import com.google.api.services.cloudkms.v1.CloudKMS;
20 import com.google.api.services.cloudkms.v1.model.DecryptRequest;
21 import com.google.api.services.cloudkms.v1.model.DecryptResponse;
22 import com.google.api.services.cloudkms.v1.model.EncryptRequest;
23 import com.google.api.services.cloudkms.v1.model.EncryptResponse;
39 private final CloudKMS kmsClient;
46 public GcpKmsAead(CloudKMS kmsClient, String keyName) { in GcpKmsAead()
/aosp_15_r20/external/python/google-api-python-client/googleapiclient/discovery_cache/documents/
Dcloudkms.v1.json8 "https://www.googleapis.com/auth/cloudkms": {
15 "baseUrl": "https://cloudkms.googleapis.com/",
26 "id": "cloudkms:v1",
28 "mtlsRootUrl": "https://cloudkms.mtls.googleapis.com/",
29 "name": "cloudkms",
119 "id": "cloudkms.projects.locations.generateRandomBytes",
141 "https://www.googleapis.com/auth/cloudkms"
148 "id": "cloudkms.projects.locations.get",
167 "https://www.googleapis.com/auth/cloudkms"
174 "id": "cloudkms.projects.locations.list",
[all …]
/aosp_15_r20/external/google-cloud-java/java-kms/proto-google-cloud-kms-v1/src/main/java/com/google/cloud/kms/v1/
H A DKmsProto.java207 + "parent\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapi"
214 + "A\002\372A#\n!cloudkms.googleapis.com/CryptoKey"
220 + "ent\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapis.c"
237 + "\004name\030\001 \001(\tB\'\340A\002\372A!\n\037cloudkms.googleapis"
239 + "ame\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.googleapis.c"
241 + "st\022>\n\004name\030\001 \001(\tB0\340A\002\372A*\n(cloudkms.googl"
246 + "cloudkms.googleapis.com/ImportJob\"\240\001\n\024Cr"
252 + "\'\340A\002\372A!\n\037cloudkms.googleapis.com/KeyRing"
257 + "\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.googlea"
261 + "est\0229\n\006parent\030\001 \001(\tB)\340A\002\372A#\n!cloudkms.go"
[all …]
H A DEkmServiceProto.java98 + "(\tB-\340A\002\372A\'\n%cloudkms.googleapis.com/EkmC"
136 + "\n\006MANUAL\020\001\022\r\n\tCLOUD_KMS\020\002:s\352Ap\n%cloudkms"
141 + "n\030\002 \001(\tB-\340A\001\372A\'\n%cloudkms.googleapis.com"
142 + "/EkmConnection:Y\352AV\n!cloudkms.googleapis"
174 + "mask\032t\312A\027cloudkms.googleapis.com\322AWhttps"
/aosp_15_r20/external/sdk-platform-java/test/integration/apis/kms/v1/
H A Dservice.proto50 option (google.api.default_host) = "cloudkms.googleapis.com";
53 "https://www.googleapis.com/auth/cloudkms";
402 type: "cloudkms.googleapis.com/KeyRing"
444 type: "cloudkms.googleapis.com/CryptoKey"
485 type: "cloudkms.googleapis.com/KeyRing"
588 type: "cloudkms.googleapis.com/KeyRing"
601 type: "cloudkms.googleapis.com/CryptoKey"
614 type: "cloudkms.googleapis.com/CryptoKeyVersion"
627 type: "cloudkms.googleapis.com/CryptoKeyVersion"
640 type: "cloudkms.googleapis.com/ImportJob"
[all …]
/aosp_15_r20/external/googleapis/google/cloud/kms/v1/
H A Dcloudkms_v1.yaml3 name: cloudkms.googleapis.com
94 https://www.googleapis.com/auth/cloudkms
99 https://www.googleapis.com/auth/cloudkms
104 https://www.googleapis.com/auth/cloudkms
109 https://www.googleapis.com/auth/cloudkms
114 https://www.googleapis.com/auth/cloudkms
H A Dekm_service.proto44 option (google.api.default_host) = "cloudkms.googleapis.com";
47 "https://www.googleapis.com/auth/cloudkms";
183 type: "cloudkms.googleapis.com/EkmConnection"
230 type: "cloudkms.googleapis.com/EkmConfig"
297 type: "cloudkms.googleapis.com/EkmConnection"
416 type: "cloudkms.googleapis.com/EkmConfig"
431 type: "cloudkms.googleapis.com/EkmConnection"
444 type: "cloudkms.googleapis.com/EkmConnection"
H A Dservice.proto48 option (google.api.default_host) = "cloudkms.googleapis.com";
51 "https://www.googleapis.com/auth/cloudkms";
454 type: "cloudkms.googleapis.com/KeyRing"
496 type: "cloudkms.googleapis.com/CryptoKey"
537 type: "cloudkms.googleapis.com/KeyRing"
640 type: "cloudkms.googleapis.com/KeyRing"
653 type: "cloudkms.googleapis.com/CryptoKey"
666 type: "cloudkms.googleapis.com/CryptoKeyVersion"
679 type: "cloudkms.googleapis.com/CryptoKeyVersion"
692 type: "cloudkms.googleapis.com/ImportJob"
[all …]
/aosp_15_r20/external/python/google-api-python-client/docs/dyn/
Dlogging_v2.v2.html85 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte…
107 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
109 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
115 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte…
123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
138 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
140 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
Dlogging_v2.organizations.html105 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte…
127 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
129 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
135 …, or 2) the associated service account does not have the required roles/cloudkms.cryptoKeyEncrypte…
143 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
145 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
158 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
160 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
Dlogging_v2.folders.locations.buckets.html123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
[all …]
Dlogging_v2.organizations.locations.buckets.html123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
[all …]
Dlogging_v2.projects.locations.buckets.html123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
[all …]
Dlogging_v2.locations.buckets.html123 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
125 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
150 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
152 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
201 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
203 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
238 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
240 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
283 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
285 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
[all …]
Dlogging_v2.billingAccounts.locations.buckets.html120 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
122 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
147 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
149 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
202 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
204 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
247 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
249 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
274 … kms_key_name for which the associated service account has the required cloudkms.cryptoKeyEncrypte…
276 … KMS key.Before enabling CMEK for Log Router, you must first assign the cloudkms.cryptoKeyEncrypte…
/aosp_15_r20/external/google-cloud-java/java-kms/proto-google-cloud-kms-v1/src/main/proto/google/cloud/kms/v1/
H A Dservice.proto48 option (google.api.default_host) = "cloudkms.googleapis.com";
51 "https://www.googleapis.com/auth/cloudkms";
430 type: "cloudkms.googleapis.com/KeyRing"
472 type: "cloudkms.googleapis.com/CryptoKey"
513 type: "cloudkms.googleapis.com/KeyRing"
616 type: "cloudkms.googleapis.com/KeyRing"
629 type: "cloudkms.googleapis.com/CryptoKey"
642 type: "cloudkms.googleapis.com/CryptoKeyVersion"
655 type: "cloudkms.googleapis.com/CryptoKeyVersion"
668 type: "cloudkms.googleapis.com/ImportJob"
[all …]
H A Dekm_service.proto44 option (google.api.default_host) = "cloudkms.googleapis.com";
47 "https://www.googleapis.com/auth/cloudkms";
170 type: "cloudkms.googleapis.com/EkmConnection"
217 type: "cloudkms.googleapis.com/EkmConfig"
284 type: "cloudkms.googleapis.com/EkmConnection"
403 type: "cloudkms.googleapis.com/EkmConfig"
418 type: "cloudkms.googleapis.com/EkmConnection"
/aosp_15_r20/external/tink/go/integration/gcpkms/
H A Dgcp_kms_aead.go22 "google.golang.org/api/cloudkms/v1"
30 kms cloudkms.Service
36 func newGCPAEAD(keyURI string, kms *cloudkms.Service) tink.AEAD {
46 req := &cloudkms.EncryptRequest{
61 req := &cloudkms.DecryptRequest{
/aosp_15_r20/external/googleapis/google/spanner/admin/database/v1/
H A Dcommon.proto32 type: "cloudkms.googleapis.com/CryptoKey"
36 type: "cloudkms.googleapis.com/CryptoKeyVersion"
61 type: "cloudkms.googleapis.com/CryptoKey"
96 type: "cloudkms.googleapis.com/CryptoKeyVersion"
/aosp_15_r20/external/google-cloud-java/java-container/proto-google-cloud-container-v1beta1/src/main/java/com/google/container/v1beta1/
H A DDatabaseEncryption.java238 * Name of CloudKMS key to use for the encryption of secrets in etcd.
262 * Name of CloudKMS key to use for the encryption of secrets in etcd.
689 * Name of CloudKMS key to use for the encryption of secrets in etcd.
712 * Name of CloudKMS key to use for the encryption of secrets in etcd.
735 * Name of CloudKMS key to use for the encryption of secrets in etcd.
757 * Name of CloudKMS key to use for the encryption of secrets in etcd.
775 * Name of CloudKMS key to use for the encryption of secrets in etcd.
/aosp_15_r20/external/google-cloud-java/java-container/proto-google-cloud-container-v1/src/main/java/com/google/container/v1/
H A DDatabaseEncryption.java238 * Name of CloudKMS key to use for the encryption of secrets in etcd.
262 * Name of CloudKMS key to use for the encryption of secrets in etcd.
686 * Name of CloudKMS key to use for the encryption of secrets in etcd.
709 * Name of CloudKMS key to use for the encryption of secrets in etcd.
732 * Name of CloudKMS key to use for the encryption of secrets in etcd.
754 * Name of CloudKMS key to use for the encryption of secrets in etcd.
772 * Name of CloudKMS key to use for the encryption of secrets in etcd.
/aosp_15_r20/external/googleapis/google/cloud/kms/
H A DBUILD.bazel16 # Generates a Ruby wrapper client for cloudkms.
27 "ruby-cloud-api-id=cloudkms.googleapis.com",
28 "ruby-cloud-api-shortname=cloudkms",

12345678