/third_party/node/test/parallel/ |
D | test-webcrypto-export-import-cfrg.js | 107 async function testImportSpki({ name, publicUsages }, extractable) { argument 112 extractable, 115 assert.strictEqual(key.extractable, extractable); 119 if (extractable) { 138 extractable, 143 async function testImportPkcs8({ name, privateUsages }, extractable) { argument 148 extractable, 151 assert.strictEqual(key.extractable, extractable); 155 if (extractable) { 173 extractable, [all …]
|
D | test-webcrypto-export-import-ec.js | 102 async function testImportSpki({ name, publicUsages }, namedCurve, extractable) { argument 107 extractable, 110 assert.strictEqual(key.extractable, extractable); 115 if (extractable) { 134 extractable, 142 extractable) { argument 147 extractable, 150 assert.strictEqual(key.extractable, extractable); 155 if (extractable) { 173 extractable, [all …]
|
D | test-webcrypto-export-import-rsa.js | 302 async function testImportSpki({ name, publicUsages }, size, hash, extractable) { argument 307 extractable, 311 assert.strictEqual(key.extractable, extractable); 319 if (extractable) { 336 extractable) { argument 341 extractable, 345 assert.strictEqual(key.extractable, extractable); 353 if (extractable) { 370 extractable, 379 extractable) { argument [all …]
|
D | test-webcrypto-keygen.js | 283 assert.strictEqual(publicKey.extractable, true); 284 assert.strictEqual(privateKey.extractable, true); 437 assert.strictEqual(publicKey.extractable, true); 438 assert.strictEqual(privateKey.extractable, true); 507 assert.strictEqual(key.extractable, true); 566 assert.strictEqual(key.extractable, true); 629 assert.strictEqual(publicKey.extractable, true); 630 assert.strictEqual(privateKey.extractable, true);
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
D | symmetric_importKey.https.any.js | 21 …{name: "AES-CTR", legalUsages: ["encrypt", "decrypt"], extractable: [true, fals… property 22 …{name: "AES-CBC", legalUsages: ["encrypt", "decrypt"], extractable: [true, fals… property 23 …{name: "AES-GCM", legalUsages: ["encrypt", "decrypt"], extractable: [true, fals… property 24 …{name: "AES-KW", legalUsages: ["wrapKey", "unwrapKey"], extractable: [true, fals… property 25 …{name: "HMAC", hash: "SHA-1", legalUsages: ["sign", "verify"], extractable: [false], … property 26 …{name: "HMAC", hash: "SHA-256", legalUsages: ["sign", "verify"], extractable: [false], … property 27 …{name: "HMAC", hash: "SHA-384", legalUsages: ["sign", "verify"], extractable: [false], … property 28 …{name: "HMAC", hash: "SHA-512", legalUsages: ["sign", "verify"], extractable: [false], … property 29 …{name: "HKDF", legalUsages: ["deriveBits", "deriveKey"], extractable: [false], … property 30 …{name: "PBKDF2", legalUsages: ["deriveBits", "deriveKey"], extractable: [false], … property [all …]
|
D | okp_importKey_failures.js | 37 function parameterString(format, algorithm, extractable, usages, data) { argument 49 objectToString(extractable) + ", " + 61 …function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTa… argument 65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages); 71 … }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData)); 127 [true, false].forEach(function(extractable) { argument 128 …testError(test.format, algorithm, test.data, name, usages, extractable, "SyntaxError", "Bad usages… 141 [true, false].forEach(function(extractable) { argument 142 …stError(test.format, algorithm, test.data, name, [/* Empty usages */], extractable, "SyntaxError",… 154 [true, false].forEach(function(extractable) { argument [all …]
|
D | rsa_importKey.https.any.js | 78 [true, false].forEach(function(extractable) { argument 89 testFormat(format, algorithm, data, size, usages, extractable); 99 testFormat(format, algorithm, data, size, usages, extractable); 101 testEmptyUsages(format, algorithm, data, size, extractable); 112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 117 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 118 if (!extractable) { 135 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 140 function testEmptyUsages(format, algorithm, keyData, keySize, extractable) { argument [all …]
|
D | ec_importKey.https.any.js | 71 [true, false].forEach(function(extractable) { argument 82 testFormat(format, algorithm, data, curve, usages, extractable); 92 testFormat(format, algorithm, data, curve, usages, extractable); 94 testEmptyUsages(format, algorithm, data, curve, extractable); 104 function testFormat(format, algorithm, data, keySize, usages, extractable) { argument 111 return subtle.importKey(format, keyData, algorithm, extractable, usages). 114 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 115 if (!extractable) { 136 …tring() + " bits " + parameterString(format, compressed, keyData, algorithm, extractable, usages)); 141 function testEmptyUsages(format, algorithm, data, keySize, extractable) { argument [all …]
|
D | okp_importKey.https.any.js | 72 [true, false].forEach(function(extractable) { argument 83 testFormat(format, algorithm, data, vector.name, usages, extractable); 94 testFormat(format, algorithm, data, vector.name, usages, extractable); 103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 108 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 109 if (!extractable) { 126 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 238 function parameterString(format, data, algorithm, extractable, usages) { argument 248 objectToString(extractable) + ", " +
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
D | failures.js | 52 function parameterString(algorithm, extractable, usages) { argument 59 objectToString(extractable) + ", " + 71 function testError(algorithm, extractable, usages, expectedError, testTag) { argument 73 return crypto.subtle.generateKey(algorithm, extractable, usages) 83 }, testTag + ": generateKey" + parameterString(algorithm, extractable, usages)); 163 [false, true, "RED", 7].forEach(function(extractable){ argument 164 testError(algorithm, extractable, usages, "NotSupportedError", "Bad algorithm"); 178 [true].forEach(function(extractable) { argument 179 testError(algorithm, extractable, usages, "SyntaxError", "Bad usages"); 195 [false, true].forEach(function(extractable) { argument [all …]
|
D | successes.js | 46 function parameterString(algorithm, extractable, usages) { argument 49 objectToString(extractable) + ", " + 57 function testSuccess(algorithm, extractable, usages, resultType, testTag) { argument 63 return subtle.generateKey(algorithm, extractable, usages) 66 … assert_goodCryptoKey(result.privateKey, algorithm, extractable, usages, "private"); 69 assert_goodCryptoKey(result, algorithm, extractable, usages, "secret"); 74 }, testTag + ": generateKey" + parameterString(algorithm, extractable, usages)); 83 [false, true].forEach(function(extractable) { argument 84 … subsetTest(testSuccess, algorithm, extractable, usages, vector.resultType, "Success");
|
/third_party/node/lib/internal/crypto/ |
D | webcrypto.js | 91 extractable, argument 102 extractable = webidl.converters.boolean(extractable, { 122 .rsaKeyGenerate(algorithm, extractable, keyUsages); 133 .cfrgGenerateKey(algorithm, extractable, keyUsages); 140 .ecGenerateKey(algorithm, extractable, keyUsages); 145 .hmacGenerateKey(algorithm, extractable, keyUsages); 156 .aesGenerateKey(algorithm, extractable, keyUsages); 253 extractable, argument 272 extractable = webidl.converters.boolean(extractable, { 317 ['raw', bits, derivedKeyAlgorithm, extractable, keyUsages], [all …]
|
D | mac.js | 44 async function hmacGenerateKey(algorithm, extractable, keyUsages) { argument 70 extractable); 89 extractable, argument 134 extractable === true) { 165 extractable);
|
D | keys.js | 663 extractable: this.extractable, 675 get extractable() { getter in CryptoKey 696 extractable: kEnumerableProperty, property 716 extractable) { argument 722 this[kExtractable] = extractable; 732 const extractable = this.extractable; 740 extractable, 746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) { field 750 this[kExtractable] = extractable;
|
D | ec.js | 80 async function ecGenerateKey(algorithm, extractable, keyUsages) { argument 140 extractable); 156 extractable, argument 223 extractable === true) { 281 extractable);
|
D | rsa.js | 109 extractable, argument 188 extractable); 205 extractable, argument 260 extractable === true) { 306 }, keyUsages, extractable);
|
D | cfrg.js | 106 async function cfrgGenerateKey(algorithm, extractable, keyUsages) { argument 184 extractable); 201 extractable, argument 269 extractable === true) { 329 extractable);
|
D | aes.js | 216 async function aesGenerateKey(algorithm, extractable, keyUsages) { argument 246 extractable); 253 extractable, argument 292 extractable === true) { 329 extractable);
|
/third_party/typescript/lib/ |
D | lib.webworker.iterable.d.ts | 88 … | AesDerivedKeyParams | HmacImportParams | HkdfParams | Pbkdf2Params, extractable: boolean, keyUs… 89 …generateKey(algorithm: RsaHashedKeyGenParams | EcKeyGenParams, extractable: boolean, keyUsages: Re… 90 …generateKey(algorithm: AesKeyGenParams | HmacKeyGenParams | Pbkdf2Params, extractable: boolean, ke… 91 …generateKey(algorithm: AlgorithmIdentifier, extractable: boolean, keyUsages: Iterable<KeyUsage>): … 92 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 93 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 94 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs…
|
D | lib.dom.iterable.d.ts | 242 … | AesDerivedKeyParams | HmacImportParams | HkdfParams | Pbkdf2Params, extractable: boolean, keyUs… 243 …generateKey(algorithm: RsaHashedKeyGenParams | EcKeyGenParams, extractable: boolean, keyUsages: Re… 244 …generateKey(algorithm: AesKeyGenParams | HmacKeyGenParams | Pbkdf2Params, extractable: boolean, ke… 245 …generateKey(algorithm: AlgorithmIdentifier, extractable: boolean, keyUsages: Iterable<KeyUsage>): … 246 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 247 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 248 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs…
|
/third_party/typescript/src/lib/ |
D | webworker.iterable.generated.d.ts | 68 … | AesDerivedKeyParams | HmacImportParams | HkdfParams | Pbkdf2Params, extractable: boolean, keyUs… 69 …generateKey(algorithm: RsaHashedKeyGenParams | EcKeyGenParams, extractable: boolean, keyUsages: Re… 70 …generateKey(algorithm: AesKeyGenParams | HmacKeyGenParams | Pbkdf2Params, extractable: boolean, ke… 71 …generateKey(algorithm: AlgorithmIdentifier, extractable: boolean, keyUsages: Iterable<KeyUsage>): … 72 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 73 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 74 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs…
|
D | dom.iterable.generated.d.ts | 222 … | AesDerivedKeyParams | HmacImportParams | HkdfParams | Pbkdf2Params, extractable: boolean, keyUs… 223 …generateKey(algorithm: RsaHashedKeyGenParams | EcKeyGenParams, extractable: boolean, keyUsages: Re… 224 …generateKey(algorithm: AesKeyGenParams | HmacKeyGenParams | Pbkdf2Params, extractable: boolean, ke… 225 …generateKey(algorithm: AlgorithmIdentifier, extractable: boolean, keyUsages: Iterable<KeyUsage>): … 226 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 227 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs… 228 …ImportParams | EcKeyImportParams | HmacImportParams | AesKeyAlgorithm, extractable: boolean, keyUs…
|
/third_party/node/test/fixtures/wpt/interfaces/ |
D | WebCryptoAPI.idl | 35 readonly attribute boolean extractable; 61 boolean extractable, 66 boolean extractable, 75 boolean extractable, 88 boolean extractable,
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/ |
D | helpers.js | 95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) { argument 107 assert_equals(key.extractable, extractable, "Extractability is correct");
|
/third_party/node/doc/api/ |
D | webcrypto.md | 433 ### `cryptoKey.extractable` 596 ### `subtle.deriveKey(algorithm, baseKey, derivedKeyAlgorithm, extractable, keyUsages)` 611 * `extractable`: {boolean} 623 `subtle.importKey()` method using the `deriveKeyAlgorithm`, `extractable`, and 700 If the {CryptoKey} is not extractable, the returned promise will reject. 727 ### `subtle.generateKey(algorithm, extractable, keyUsages)` 739 * `extractable`: {boolean} 768 ### `subtle.importKey(format, keyData, algorithm, extractable, keyUsages)` 791 * `extractable`: {boolean} 797 `algorithm`, `extractable`, and `keyUsages` arguments. If the import is [all …]
|