/third_party/openssl/ |
D | BUILD.gn | 62 "${openssl_selected_platform_full_path}/crypto/aes/aes-armv4.S", 63 "${openssl_selected_platform_full_path}/crypto/aes/aesv8-armx.S", 64 "${openssl_selected_platform_full_path}/crypto/aes/bsaes-armv7.S", 65 "${openssl_selected_platform_full_path}/crypto/armv4cpuid.S", 66 "${openssl_selected_platform_full_path}/crypto/bn/armv4-gf2m.S", 67 "${openssl_selected_platform_full_path}/crypto/bn/armv4-mont.S", 68 "${openssl_selected_platform_full_path}/crypto/chacha/chacha-armv4.S", 69 "${openssl_selected_platform_full_path}/crypto/ec/ecp_nistz256-armv4.S", 70 "${openssl_selected_platform_full_path}/crypto/modes/ghash-armv4.S", 71 "${openssl_selected_platform_full_path}/crypto/modes/ghashv8-armx.S", [all …]
|
/third_party/openssl/providers/ |
D | fips.module.sources | 1 crypto/aes/aes_cbc.c 2 crypto/aes/aes_core.c 3 crypto/aes/aes_ecb.c 4 crypto/aes/aes_local.h 5 crypto/aes/aes_misc.c 6 crypto/aes/asm/aes-586.pl 7 crypto/aes/asm/aes-armv4.pl 8 crypto/aes/asm/aes-c64xplus.pl 9 crypto/aes/asm/aes-ia64.S 10 crypto/aes/asm/aes-mips.pl [all …]
|
D | fips-sources.checksums | 1 0e22ea0cf34ef3871e30df0bc302dc29352d38001d1622ddb78a27a374b6aee8 crypto/aes/aes_cbc.c 2 c049a936d74100fcced225f575d46662792a6a0039777d2d4df0cf61eff90a68 crypto/aes/aes_core.c 3 3fac41ce96acb9189eac2d5571425c3ff33a34c884ae7e275e1fd3068b5fc662 crypto/aes/aes_ecb.c 4 c1e674d08683a25bc053f6233f73a0d0b3a90aafe591ff57b702c7da1582e4a5 crypto/aes/aes_local.h 5 a2466f18da5847c7d9fbced17524633c10ce024671a72f53f9c9c55b9b9923dd crypto/aes/aes_misc.c 6 6979c133f76f4623e62e6e970deae70fa025e713a72b71aead5a048d49e47f6f crypto/aes/asm/aes-586.pl 7 92be9ff608331a432e95247a8f4fb9e46897d0cb76f2b6db809b61d44287964a crypto/aes/asm/aes-armv4.pl 8 953897f86e2de9fa27ef411155ab3aed133af94885f1507e76449c142da78656 crypto/aes/asm/aes-c64xplus.pl 9 00196f01f5218ad731e6a058d406078f7228a9756d9d73f51c0d0c2a68f885af crypto/aes/asm/aes-ia64.S 10 88b6f8396cd9d86004743d5c3b0f72b7b8c3d5a2b00b0bbb761ba91ae5a7cdc8 crypto/aes/asm/aes-mips.pl [all …]
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-sign/ |
D | CMakeLists.txt | 1 project(lws-crypto-cose-sign C) 8 set(SAMP lws-crypto-cose-sign) 20 add_test(NAME crypto-cose-sign-1 21 COMMAND lws-crypto-cose-sign -s -k set1.cks --kid 11 25 add_test(NAME crypto-cose-sign-2 26 COMMAND lws-crypto-cose-sign -s -k set1.cks --kid sec384 30 add_test(NAME crypto-cose-sign-3 31 COMMAND lws-crypto-cose-sign -s -k set1.cks --kid sec512 38 add_test(NAME crypto-cose-sign-4 39 COMMAND lws-crypto-cose-sign -k set1.cks [all …]
|
/third_party/openssl/crypto/err/ |
D | openssl.ec | 7 L BN include/openssl/bnerr.h crypto/bn/bn_err.c include/cry… 8 L RSA include/openssl/rsaerr.h crypto/rsa/rsa_err.c include/cry… 9 L DH include/openssl/dherr.h crypto/dh/dh_err.c include/cry… 10 L EVP include/openssl/evperr.h crypto/evp/evp_err.c include/cry… 11 L BUF include/openssl/buffererr.h crypto/buffer/buf_err.c include/cry… 12 L OBJ include/openssl/objectserr.h crypto/objects/obj_err.c include/cry… 13 L PEM include/openssl/pemerr.h crypto/pem/pem_err.c include/cry… 14 L DSA include/openssl/dsaerr.h crypto/dsa/dsa_err.c include/cry… 15 L X509 include/openssl/x509err.h crypto/x509/x509_err.c include/cry… 16 L ASN1 include/openssl/asn1err.h crypto/asn1/asn1_err.c include/cry… [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-sign-verify.js | 10 const crypto = require('crypto'); constant 19 const Sign = crypto.Sign; 26 const Verify = crypto.Verify; 43 crypto.createSign('sha1').sign( 60 crypto.createSign('SHA1') 64 padding: crypto.constants.RSA_PKCS1_OAEP_PADDING 72 () => crypto.createVerify('SHA256').verify({ 83 () => crypto.createVerify('SHA256').verify({ 95 const s1 = crypto.createSign('SHA1') 98 let s1stream = crypto.createSign('SHA1'); [all …]
|
D | test-crypto-pbkdf2.js | 7 const crypto = require('crypto'); constant 14 crypto.pbkdf2Sync(password, salt, iterations, keylen, 'sha256'); 17 crypto.pbkdf2(password, salt, iterations, keylen, 'sha256', 49 const key = crypto.pbkdf2Sync('password', 'salt', 32, 32, 'sha256'); 52 crypto.pbkdf2('password', 'salt', 32, 32, 'sha256', 61 () => crypto.pbkdf2('password', 'salt', 1, 20, 'sha1'), 70 () => crypto.pbkdf2Sync('password', 'salt', iterations, 20, 'sha1'), 83 crypto.pbkdf2Sync('password', 'salt', 1, notNumber, 'sha256'); 95 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', 108 crypto.pbkdf2('password', 'salt', 1, input, 'sha256', [all …]
|
D | test-crypto-dh-stateless.js | 7 const crypto = require('crypto'); constant 9 assert.throws(() => crypto.diffieHellman(), { 18 const buf1 = crypto.diffieHellman({ 22 const buf2 = crypto.diffieHellman({ 32 const alicePrivateKey = crypto.createPrivateKey({ 47 const alicePublicKey = crypto.createPublicKey({ 62 const bobPrivateKey = crypto.createPrivateKey({ 77 const bobPublicKey = crypto.createPublicKey({ 92 assert.throws(() => crypto.diffieHellman({ privateKey: alicePrivateKey }), { 98 assert.throws(() => crypto.diffieHellman({ publicKey: alicePublicKey }), { [all …]
|
D | test-crypto-hash.js | 7 const crypto = require('crypto'); constant 16 const a1 = crypto.createHash('sha1').update('Test123').digest('hex'); 17 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 18 const a3 = crypto.createHash('sha512').update('Test123').digest(); // buffer 19 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer'); 22 let a5 = crypto.createHash('sha512'); 26 let a6 = crypto.createHash('sha512'); 33 let a7 = crypto.createHash('sha512'); 37 let a8 = crypto.createHash('sha512'); 45 const a0 = crypto.createHash(cryptoType).update('Test123').digest(digest); [all …]
|
D | test-crypto-rsa-dsa.js | 7 const crypto = require('crypto'); constant 9 const constants = crypto.constants; 43 let encryptedBuffer = crypto.publicEncrypt(rsaPubPem, bufferToEncrypt); 45 let decryptedBuffer = crypto.privateDecrypt(rsaKeyPem, encryptedBuffer); 48 decryptedBuffer = crypto.privateDecrypt(rsaPkcs8KeyPem, encryptedBuffer); 51 let decryptedBufferWithPassword = crypto.privateDecrypt({ 57 encryptedBuffer = crypto.publicEncrypt({ 62 decryptedBufferWithPassword = crypto.privateDecrypt({ 68 encryptedBuffer = crypto.privateEncrypt({ 73 decryptedBufferWithPassword = crypto.publicDecrypt({ [all …]
|
D | test-crypto-dh.js | 7 const crypto = require('crypto'); constant 11 const dh1 = crypto.createDiffieHellman(common.hasFipsCrypto ? 1024 : 256); 13 const dh2 = crypto.createDiffieHellman(p1, 'buffer'); 26 assert.throws(() => crypto.createDiffieHellman(13.37), { 33 assert.throws(() => crypto.createDiffieHellman('abcdef', 13.37), { 41 assert.throws(() => crypto.createDiffieHellman(bits), { 51 crypto.createDiffieHellman('abcdef', g); 52 crypto.createDiffieHellman('abcdef', 'hex', g); 61 assert.throws(() => crypto.createDiffieHellman('abcdef', g), ex); 62 assert.throws(() => crypto.createDiffieHellman('abcdef', 'hex', g), ex); [all …]
|
D | test-crypto-cipher-decipher.js | 10 const crypto = require('crypto'); constant 25 const cipher = crypto.createCipher('aes192', key); 33 const decipher = crypto.createDecipher('aes192', key); 43 const cStream = crypto.createCipher('aes192', key); 47 const dStream = crypto.createDecipher('aes192', key); 62 const cipher = crypto.createCipher('aes256', key); 69 const decipher = crypto.createDecipher('aes256', key); 83 const Cipher = crypto.Cipher; 84 const instance = crypto.Cipher('aes-256-cbc', 'secret'); 89 () => crypto.createCipher(null), [all …]
|
D | test-crypto-random.js | 30 const crypto = require('crypto'); constant 41 [crypto.randomBytes, crypto.pseudoRandomBytes].forEach((f) => { 77 const after = crypto.randomFillSync(buf).toString('hex'); 84 crypto.randomFillSync(buf); 98 crypto.randomFillSync(buf); 107 crypto.randomFill(buf, common.mustSucceed((buf) => { 116 crypto.randomFill(buf, common.mustSucceed((buf) => { 131 crypto.randomFill(buf, common.mustSucceed((buf) => { 141 crypto.randomFillSync(buf, 5, 5); 150 crypto.randomFillSync(buf, 5, 5); [all …]
|
D | test-crypto-scrypt.js | 8 const crypto = require('crypto'); constant 150 const actual = crypto.scryptSync(pass, salt, keylen, options); 152 crypto.scrypt(pass, salt, keylen, options, common.mustSucceed((actual) => { 163 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}), 165 assert.throws(() => crypto.scryptSync('pass', 'salt', 1, options), 175 assert.throws(() => crypto.scrypt('pass', 'salt', 1, options, () => {}), 177 assert.throws(() => crypto.scryptSync('pass', 'salt', 1, options), 183 const expected = crypto.scryptSync('pass', 'salt', 1, defaults); 184 const actual = crypto.scryptSync('pass', 'salt', 1); 186 crypto.scrypt('pass', 'salt', 1, common.mustSucceed((actual) => { [all …]
|
D | test-crypto-cipheriv-decipheriv.js | 7 const crypto = require('crypto'); constant 15 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv); 19 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv); 30 const cStream = crypto.createCipheriv('des-ede3-cbc', key, iv); 34 const dStream = crypto.createDecipheriv('des-ede3-cbc', key, iv); 49 const cipher = crypto.createCipheriv('des-ede3-cbc', key, iv); 53 const decipher = crypto.createDecipheriv('des-ede3-cbc', key, iv); 67 const cipher = crypto.createCipheriv('id-aes128-wrap', key, iv); 73 const decipher = crypto.createDecipheriv('id-aes128-wrap', key, iv); 82 const Cipheriv = crypto.Cipheriv; [all …]
|
D | test-crypto-binary-default.js | 35 const crypto = require('crypto'); constant 66 const hmacHash = crypto.createHmac('sha1', 'Node') 222 let result = crypto.createHmac(hash, testCase.key) 350 crypto.createHmac('md5', testCase.key) 359 crypto.createHmac('sha1', testCase.key) 368 const a1 = crypto.createHash('sha1').update('Test123').digest('hex'); 369 const a2 = crypto.createHash('sha256').update('Test123').digest('base64'); 370 const a3 = crypto.createHash('sha512').update('Test123').digest(); // binary 371 const a4 = crypto.createHash('sha1').update('Test123').digest('buffer'); 374 const a0 = crypto.createHash('md5').update('Test123').digest('latin1'); [all …]
|
D | test-crypto.js | 35 const crypto = require('crypto'); constant 97 () => crypto.createHash('sha1').update({ foo: 'bar' }), 121 const cryptoCiphers = crypto.getCiphers(); 122 assert(crypto.getCiphers().includes('aes-128-cbc')); 135 assert.notStrictEqual(crypto.getHashes().length, 0); 136 assert(crypto.getHashes().includes('sha1')); 137 assert(crypto.getHashes().includes('sha256')); 138 assert(!crypto.getHashes().includes('SHA1')); 139 assert(!crypto.getHashes().includes('SHA256')); 140 assert(crypto.getHashes().includes('RSA-SHA1')); [all …]
|
D | test-crypto-authenticated.js | 28 const crypto = require('crypto'); constant 31 crypto.DEFAULT_ENCODING = 'buffer'; 49 const ciphers = crypto.getCiphers(); 113 const encrypt = crypto.createCipheriv(test.algo, 135 crypto.createDecipheriv(test.algo, 141 const decrypt = crypto.createDecipheriv(test.algo, 164 assert.throws(() => { crypto.createCipher(test.algo, test.password); }, 167 const encrypt = crypto.createCipher(test.algo, test.password, options); 183 assert.throws(() => { crypto.createDecipher(test.algo, test.password); }, 186 const decrypt = crypto.createDecipher(test.algo, test.password, options); [all …]
|
D | test-crypto-hmac.js | 7 const crypto = require('crypto'); constant 10 const Hmac = crypto.Hmac; 11 const instance = crypto.Hmac('sha256', 'Node'); 17 () => crypto.createHmac(null), 26 () => crypto.createHmac('sha256', 'key').digest({ 35 () => crypto.createHmac('sha1', null), 54 ...(typeof key === 'string' ? [] : [crypto.createSecretKey]), 58 const hmac = crypto.createHmac(algo, keyWrapper(key)); 270 const str = crypto.createHmac(hash, rfc4231[i].key); 273 let actual = crypto.createHmac(hash, rfc4231[i].key) [all …]
|
D | test-domain-crypto.js | 29 const crypto = require('crypto'); constant 37 crypto.randomBytes(8); 38 crypto.randomBytes(8, common.mustSucceed()); 40 crypto.randomFillSync(buf); 41 crypto.pseudoRandomBytes(8); 42 crypto.pseudoRandomBytes(8, common.mustSucceed()); 43 crypto.pbkdf2('password', 'salt', 8, 8, 'sha1', common.mustSucceed());
|
D | test-crypto-stream.js | 29 const crypto = require('crypto'); constant 50 const hasher1 = crypto.createHash('md5'); 60 crypto.createHash('md5').unpipe({}); 61 crypto.createHash('md5').setEncoding('utf8'); 62 crypto.createHash('md5').pause(); 63 crypto.createHash('md5').resume(); 70 const cipher = crypto.createCipheriv('aes-128-cbc', key, iv); 71 const decipher = crypto.createDecipheriv('aes-128-cbc', badkey, iv);
|
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-cose-key/ |
D | CMakeLists.txt | 1 project(lws-crypto-cose-key C) 8 set(SAMP lws-crypto-cose-key) 18 add_test(NAME crypto-cose-key-1 19 COMMAND lws-crypto-cose-key --stdin set1.cks ) 20 add_test(NAME crypto-cose-key-2 21 COMMAND lws-crypto-cose-key --kty EC2 --curve P-256 --kid ctest-256 --stdout ctest-ec-256.key) 22 add_test(NAME crypto-cose-key-3 23 COMMAND lws-crypto-cose-key --kty EC2 --curve P-384 --kid ctest-384 --stdout ctest-ec-384.key) 24 add_test(NAME crypto-cose-key-4 25 COMMAND lws-crypto-cose-key --kty EC2 --curve P-521 --kid ctest-512 --stdout ctest-ec-512.key) [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/ |
D | CMakeLists.txt | 11 include_directories(src/crypto) 248 src/crypto/aes-cbc.c 249 src/crypto/aes-ccm.c 250 src/crypto/aes-ctr.c 251 src/crypto/aes-eax.c 252 src/crypto/aes-encblock.c 253 src/crypto/aes-gcm.c 254 src/crypto/aes-internal-dec.c 255 src/crypto/aes-internal-enc.c 256 src/crypto/aes-internal.c [all …]
|
/third_party/node/doc/api/ |
D | crypto.md | 7 <!-- source_link=lib/crypto.js --> 9 The `crypto` module provides cryptographic functionality that includes a set of 12 Use `require('crypto')` to access this module. 15 const crypto = require('crypto'); 18 const hash = crypto.createHmac('sha256', secret) 26 ## Determining if crypto support is unavailable 29 `crypto` module. In such cases, calling `require('crypto')` will result in an 33 let crypto; 35 crypto = require('crypto'); 37 console.log('crypto support is disabled!'); [all …]
|
/third_party/node/test/sequential/ |
D | test-crypto-timing-safe-equal.js | 7 const crypto = require('crypto'); constant 11 crypto.timingSafeEqual(Buffer.from('foo'), Buffer.from('foo')), 17 crypto.timingSafeEqual(Buffer.from('foo'), Buffer.from('bar')), 23 const buf = crypto.randomBytes(16).buffer; 30 assert.strictEqual(crypto.timingSafeEqual(left, right), true); 36 () => crypto.timingSafeEqual(Buffer.from([1, 2, 3]), Buffer.from([1, 2])), 45 () => crypto.timingSafeEqual('not a buffer', Buffer.from([1, 2])), 56 () => crypto.timingSafeEqual(Buffer.from([1, 2]), 'not a buffer'),
|