| /third_party/boringssl/src/third_party/wycheproof_testvectors/ |
| D | dsa_test.json | 28 "comment" : "Legacy:ASN encoding of r misses leading 0", string 38 "comment" : "valid", string 46 "comment" : "long form encoding of length", string 54 "comment" : "long form encoding of length", string 62 "comment" : "long form encoding of length", string 70 "comment" : "length contains leading 0", string 78 "comment" : "length contains leading 0", string 86 "comment" : "length contains leading 0", string 94 "comment" : "wrong length", string 102 "comment" : "wrong length", string [all …]
|
| D | rsa_pss_4096_sha512_mgf1_32_test.json | 22 "comment" : "", string 30 "comment" : "", string 38 "comment" : "", string 46 "comment" : "", string 54 "comment" : "", string 62 "comment" : "", string 70 "comment" : "", string 78 "comment" : "first byte of m_hash modified", string 86 "comment" : "first byte of m_hash modified", string 94 "comment" : "last byte of m_hash modified", string [all …]
|
| D | kwp_test.json | 13 "comment" : "", string 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "wrapped key is longer than wrapping key", string 49 "comment" : "wrapped key is longer than wrapping key", string 58 "comment" : "wrapped key is longer than wrapping key", string 67 "comment" : "wrapped key is longer than wrapping key", string 76 "comment" : "wrapped key is longer than wrapping key", string 85 "comment" : "wrapped key is longer than wrapping key", string 94 "comment" : "Round counter overflows 256", string [all …]
|
| D | rsa_pss_2048_sha256_mgf1_0_test.json | 22 "comment" : "", string 30 "comment" : "", string 38 "comment" : "", string 46 "comment" : "", string 54 "comment" : "", string 62 "comment" : "", string 70 "comment" : "", string 78 "comment" : "first byte of m_hash modified", string 86 "comment" : "first byte of m_hash modified", string 94 "comment" : "last byte of m_hash modified", string [all …]
|
| D | rsa_pss_4096_sha256_mgf1_32_test.json | 22 "comment" : "", string 30 "comment" : "", string 38 "comment" : "", string 46 "comment" : "", string 54 "comment" : "", string 62 "comment" : "", string 70 "comment" : "", string 78 "comment" : "first byte of m_hash modified", string 86 "comment" : "first byte of m_hash modified", string 94 "comment" : "last byte of m_hash modified", string [all …]
|
| D | rsa_pss_2048_sha256_mgf1_32_test.json | 22 "comment" : "", string 30 "comment" : "", string 38 "comment" : "", string 46 "comment" : "", string 54 "comment" : "", string 62 "comment" : "", string 70 "comment" : "", string 78 "comment" : "first byte of m_hash modified", string 86 "comment" : "first byte of m_hash modified", string 94 "comment" : "last byte of m_hash modified", string [all …]
|
| D | rsa_pss_3072_sha256_mgf1_32_test.json | 22 "comment" : "", string 30 "comment" : "", string 38 "comment" : "", string 46 "comment" : "", string 54 "comment" : "", string 62 "comment" : "", string 70 "comment" : "", string 78 "comment" : "first byte of m_hash modified", string 86 "comment" : "first byte of m_hash modified", string 94 "comment" : "last byte of m_hash modified", string [all …]
|
| D | rsa_signature_2048_sha224_test.json | 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "", string 49 "comment" : "", string 58 "comment" : "", string 67 "comment" : "", string 76 "comment" : "", string 85 "comment" : "Legacy:missing NULL", string 96 "comment" : "long form encoding of length", string 105 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_2048_sha256_test.json | 23 "comment" : "", string 32 "comment" : "", string 41 "comment" : "", string 50 "comment" : "", string 59 "comment" : "", string 68 "comment" : "", string 77 "comment" : "", string 86 "comment" : "Legacy:missing NULL", string 97 "comment" : "long form encoding of length", string 106 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_2048_sha512_test.json | 23 "comment" : "", string 32 "comment" : "", string 41 "comment" : "", string 50 "comment" : "", string 59 "comment" : "", string 68 "comment" : "", string 77 "comment" : "", string 86 "comment" : "Legacy:missing NULL", string 97 "comment" : "long form encoding of length", string 106 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_3072_sha256_test.json | 23 "comment" : "", string 32 "comment" : "", string 41 "comment" : "", string 50 "comment" : "", string 59 "comment" : "", string 68 "comment" : "", string 77 "comment" : "", string 86 "comment" : "Legacy:missing NULL", string 97 "comment" : "long form encoding of length", string 106 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_3072_sha512_test.json | 23 "comment" : "", string 32 "comment" : "", string 41 "comment" : "", string 50 "comment" : "", string 59 "comment" : "", string 68 "comment" : "", string 77 "comment" : "", string 86 "comment" : "Legacy:missing NULL", string 97 "comment" : "long form encoding of length", string 106 "comment" : "long form encoding of length", string [all …]
|
| D | ecdh_test.json | 27 "comment" : "normal case", string 36 "comment" : "compressed public key", string 47 "comment" : "edge case for shared secret", string 56 "comment" : "edge case for shared secret", string 65 "comment" : "edge case for shared secret", string 74 "comment" : "edge case for shared secret", string 83 "comment" : "edge case for shared secret", string 92 "comment" : "edge case for shared secret", string 101 "comment" : "edge case for shared secret", string 110 "comment" : "edge case for shared secret", string [all …]
|
| D | rsa_signature_3072_sha384_test.json | 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "", string 49 "comment" : "", string 58 "comment" : "", string 67 "comment" : "", string 76 "comment" : "", string 85 "comment" : "Legacy:missing NULL", string 96 "comment" : "long form encoding of length", string 105 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_4096_sha512_test.json | 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "", string 49 "comment" : "", string 58 "comment" : "", string 67 "comment" : "", string 76 "comment" : "", string 85 "comment" : "Legacy:missing NULL", string 96 "comment" : "long form encoding of length", string 105 "comment" : "long form encoding of length", string [all …]
|
| D | rsa_signature_4096_sha384_test.json | 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "", string 49 "comment" : "", string 58 "comment" : "", string 67 "comment" : "", string 76 "comment" : "", string 85 "comment" : "Legacy:missing NULL", string 96 "comment" : "long form encoding of length", string 105 "comment" : "long form encoding of length", string [all …]
|
| D | aes_cmac_test.json | 14 "comment" : "empty message", string 23 "comment" : "truncated mac", string 32 "comment" : "truncated mac", string 41 "comment" : "truncated mac", string 50 "comment" : "truncated mac", string 59 "comment" : "truncated mac", string 68 "comment" : "truncated mac", string 84 "comment" : "empty message", string 93 "comment" : "full length mac", string 102 "comment" : "full length mac", string [all …]
|
| D | ecdh_secp384r1_ecpoint_test.json | 18 "comment" : "normal case", string 27 "comment" : "compressed public key", string 38 "comment" : "edge case for shared secret", string 47 "comment" : "edge case for shared secret", string 56 "comment" : "edge case for shared secret", string 65 "comment" : "edge case for shared secret", string 74 "comment" : "edge case for shared secret", string 83 "comment" : "edge case for shared secret", string 92 "comment" : "edge case for shared secret", string 101 "comment" : "edge case for shared secret", string [all …]
|
| D | ecdh_secp384r1_test.json | 25 "comment" : "normal case", string 34 "comment" : "compressed public key", string 45 "comment" : "edge case for shared secret", string 54 "comment" : "edge case for shared secret", string 63 "comment" : "edge case for shared secret", string 72 "comment" : "edge case for shared secret", string 81 "comment" : "edge case for shared secret", string 90 "comment" : "edge case for shared secret", string 99 "comment" : "edge case for shared secret", string 108 "comment" : "edge case for shared secret", string [all …]
|
| D | ecdh_brainpoolP224r1_test.json | 26 "comment" : "normal case", string 35 "comment" : "compressed public key", string 46 "comment" : "edge case for shared secret", string 55 "comment" : "edge case for shared secret", string 64 "comment" : "edge case for shared secret", string 73 "comment" : "edge case for shared secret", string 82 "comment" : "edge case for shared secret", string 91 "comment" : "edge case for shared secret", string 100 "comment" : "edge case for shared secret", string 109 "comment" : "edge case for shared secret", string [all …]
|
| D | kw_test.json | 13 "comment" : "", string 22 "comment" : "", string 31 "comment" : "", string 40 "comment" : "wrapped key is longer than wrapping key", string 49 "comment" : "wrapped key is longer than wrapping key", string 58 "comment" : "wrapped key is longer than wrapping key", string 67 "comment" : "wrapped key is longer than wrapping key", string 76 "comment" : "wrapped key is longer than wrapping key", string 85 "comment" : "wrapped key is longer than wrapping key", string 94 "comment" : "Round counter overflows 256", string [all …]
|
| D | aes_siv_cmac_test.json | 16 "comment" : "RFC 5297", string 25 "comment" : "empty message", string 35 "comment" : "empty message", string 45 "comment" : "empty message", string 55 "comment" : "empty message", string 65 "comment" : "empty message", string 75 "comment" : "empty message", string 85 "comment" : "message size divisible by block size", string 95 "comment" : "message size divisible by block size", string 105 "comment" : "message size divisible by block size", string [all …]
|
| D | ecdh_secp256r1_ecpoint_test.json | 18 "comment" : "normal case", string 27 "comment" : "compressed public key", string 38 "comment" : "edge case for shared secret", string 47 "comment" : "edge case for shared secret", string 56 "comment" : "edge case for shared secret", string 65 "comment" : "edge case for shared secret", string 74 "comment" : "edge case for shared secret", string 83 "comment" : "edge case for shared secret", string 92 "comment" : "edge case for shared secret", string 101 "comment" : "edge case for shared secret", string [all …]
|
| D | ecdh_secp256r1_test.json | 25 "comment" : "normal case", string 34 "comment" : "compressed public key", string 45 "comment" : "edge case for shared secret", string 54 "comment" : "edge case for shared secret", string 63 "comment" : "edge case for shared secret", string 72 "comment" : "edge case for shared secret", string 81 "comment" : "edge case for shared secret", string 90 "comment" : "edge case for shared secret", string 99 "comment" : "edge case for shared secret", string 108 "comment" : "edge case for shared secret", string [all …]
|
| /third_party/node/test/fixtures/ |
| D | url-setter-tests-additional.js | 4 'comment': 'Surrogate pair', property 13 'comment': 'Unpaired low surrogate 1', property 22 'comment': 'Unpaired low surrogate 2', property 31 'comment': 'Unpaired high surrogate 1', property 40 'comment': 'Unpaired high surrogate 2', property 51 'comment': 'Surrogate pair', property 60 'comment': 'Unpaired low surrogate 1', property 69 'comment': 'Unpaired low surrogate 2', property 78 'comment': 'Unpaired high surrogate 1', property 87 'comment': 'Unpaired high surrogate 2', property [all …]
|