/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
D | successes.js | 20 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 21 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 22 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 23 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property 24 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property 25 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property 26 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 27 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property 28 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 29 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property [all …]
|
D | failures.js | 25 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 26 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 27 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 28 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property 29 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property 30 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property 31 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 32 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property 33 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 34 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property [all …]
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
D | hkdf_vectors.js | 32 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 33 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property 34 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property 35 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 36 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property 37 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property 38 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 39 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property 40 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property 41 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property [all …]
|
D | pbkdf2_vectors.js | 31 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 32 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property 33 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property 34 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 35 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property 36 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property 37 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 38 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property 39 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property 40 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property [all …]
|
/third_party/node/test/parallel/ |
D | test-webcrypto-keygen.js | 33 usages: [ property 43 usages: [ property 53 usages: [ property 63 usages: [ property 71 usages: [ property 83 usages: [ property 95 usages: [ property 107 usages: [ property 117 usages: [ property 125 usages: [ property [all …]
|
D | test-webcrypto-wrap-unwrap.js | 153 usages: ['encrypt', 'decrypt'], property 161 usages: ['encrypt', 'decrypt'], property 168 usages: ['encrypt', 'decrypt'], property 176 usages: ['wrapKey', 'unwrapKey'], property 185 usages: ['sign', 'verify'], property
|
D | test-webcrypto-derivebits-hkdf.js | 11 function getDeriveKeyInfo(name, length, hash, ...usages) { 395 usages) { argument 424 usages) { argument 468 usages) { argument 488 usages argument
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
D | okp_importKey_failures.js | 37 function parameterString(format, algorithm, extractable, usages, data) { argument 61 …function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTa… argument 101 function validUsages(usages, format, data) { argument 126 … invalidUsages(validUsages(vector, test.format, test.data)).forEach(function(usages) { argument 153 … allValidUsages(validUsages(vector, test.format, test.data)).forEach(function(usages) { argument 167 allValidUsages(validUsages(vector, 'jwk', test.data)).forEach(function(usages) { argument 181 allValidUsages(vector.privateUsages).forEach(function(usages) { argument
|
D | okp_importKey.https.any.js | 75 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument 89 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 238 function parameterString(format, data, algorithm, extractable, usages) { argument
|
D | ec_importKey.https.any.js | 74 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument 91 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 104 function testFormat(format, algorithm, data, keySize, usages, extractable) { argument 263 function parameterString(format, compressed, data, algorithm, extractable, usages) { argument
|
D | rsa_importKey.https.any.js | 81 allValidUsages(vector.publicUsages, []).forEach(function(usages) { argument 98 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 261 function parameterString(format, data, algorithm, extractable, usages) { argument
|
D | symmetric_importKey.https.any.js | 52 allValidUsages(vector.legalUsages, []).forEach(function(usages) { argument 68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 217 function parameterString(format, data, algorithm, extractable, usages) { argument
|
/third_party/nghttp2/src/ |
D | ca-config.json | 9 "usages": [ array
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
D | wrapKey_unwrapKey.https.any.js | 89 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 90 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 91 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 92 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property 93 {algorithm: {name: "HMAC", length: 128, hash: "SHA-256"}, usages: ["sign", "verify"]} property 108 …keys.push({name: params.algorithm.name, algorithm: params.algorithm, usages: params.usages, key: r… property 110 …ame: params.algorithm.name + " public key", algorithm: params.algorithm, usages: params.publicUsag… property 111 …me: params.algorithm.name + " private key", algorithm: params.algorithm, usages: params.privateUsa… property
|
/third_party/node/lib/internal/crypto/ |
D | keys.js | 687 get usages() { getter in CryptoKey 698 usages: kEnumerableProperty, property 746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) { property
|
D | cfrg.js | 49 function verifyAcceptableCfrgKeyUse(name, isPublic, usages) { argument
|
D | ec.js | 50 function verifyAcceptableEcKeyUse(name, isPublic, usages) { argument
|
D | rsa.js | 64 function verifyAcceptableRsaKeyUse(name, isPublic, usages) { argument
|
/third_party/skia/third_party/externals/dawn/src/dawn_native/ |
D | RenderBundleEncoder.cpp | 148 RenderPassResourceUsage usages = mUsageTracker.AcquireResourceUsage(); in FinishImpl() local
|
D | EncodingContext.cpp | 139 ComputePassResourceUsage usages) { in ExitComputePass()
|
/third_party/node/test/pummel/ |
D | test-webcrypto-derivebits-pbkdf2.js | 16 function getDeriveKeyInfo(name, length, hash, ...usages) { 529 usages) { argument 559 usages) { argument 602 usages) { argument 622 usages, argument
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/ |
D | helpers.js | 95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) { argument
|
/third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/image/ |
D | vktImageExtendedUsageBitTests.cpp | 258 ImageUsageFlags usages[] = in createImageExtendedUsageBitTests() local
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/image/ |
D | vktImageExtendedUsageBitTests.cpp | 258 ImageUsageFlags usages[] = in createImageExtendedUsageBitTests() local
|
/third_party/skia/third_party/externals/tint/src/reader/spirv/ |
D | usage_test.cc | 51 std::vector<Usage> usages(num_usages); in TEST_F() local
|