Home
last modified time | relevance | path

Searched refs:usages (Results 1 – 25 of 206) sorted by relevance

123456789

/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/
Dsuccesses.js20 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
21 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
22 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
23 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property
24 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property
25 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property
26 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property
27 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property
28 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property
29 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property
[all …]
Dfailures.js25 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
26 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
27 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property
28 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property
29 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property
30 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property
31 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property
32 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property
33 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property
34 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property
[all …]
/third_party/node/test/parallel/
Dtest-webcrypto-keygen.js33 usages: [ property
43 usages: [ property
53 usages: [ property
63 usages: [ property
71 usages: [ property
83 usages: [ property
95 usages: [ property
107 usages: [ property
117 usages: [ property
125 usages: [ property
[all …]
Dtest-webcrypto-wrap-unwrap.js153 usages: ['encrypt', 'decrypt'], property
161 usages: ['encrypt', 'decrypt'], property
168 usages: ['encrypt', 'decrypt'], property
176 usages: ['wrapKey', 'unwrapKey'], property
185 usages: ['sign', 'verify'], property
191 const usages = 'usages' in params ?
192 params.usages :
195 const keys = await subtle.generateKey(params.algorithm, true, usages);
201 usages: params.publicUsages,
206 usages: params.privateUsages,
[all …]
Dtest-webcrypto-derivebits-hkdf.js11 function getDeriveKeyInfo(name, length, hash, ...usages) { argument
12 return [{ name, length, hash }, usages];
395 usages) { argument
408 usages);
424 usages) { argument
439 usages),
453 usages),
468 usages) { argument
477 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), {
488 usages argument
[all …]
Dtest-webcrypto-export-import-cfrg.js116 assert.deepStrictEqual(key.usages, publicUsages);
152 assert.deepStrictEqual(key.usages, privateUsages);
226 assert.deepStrictEqual(publicKey.usages, publicUsages);
227 assert.deepStrictEqual(privateKey.usages, privateUsages);
344 assert.deepStrictEqual(publicKey.usages, publicUsages);
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
Dhkdf_vectors.js32 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property
33 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property
34 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property
35 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property
36 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property
37 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property
38 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property
39 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property
40 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property
41 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property
[all …]
Dpbkdf2_vectors.js31 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property
32 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property
33 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property
34 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property
35 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property
36 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property
37 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property
38 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property
39 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property
40 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property
[all …]
Dpbkdf2.js56 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
76 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
86 … parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
96 …iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages)
187 …ame, iterations: 0}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
219 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
Dhkdf.js69 …riveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
90 …eKey(badAlgorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
100 ….deriveKey(algorithm, noKey[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
110 …return subtle.deriveKey(algorithm, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages)
222 …riveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/
Dokp_importKey_failures.js37 function parameterString(format, algorithm, extractable, usages, data) { argument
50 objectToString(usages) +
61 …function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTa… argument
65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages);
71 … }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData));
101 function validUsages(usages, format, data) { argument
102 if (format === 'spki' || format === 'raw') return usages.publicUsages
103 if (format === 'pkcs8') return usages.privateUsages
107 return data.d === undefined ? usages.publicUsages : usages.privateUsages;
126 … invalidUsages(validUsages(vector, test.format, test.data)).forEach(function(usages) { argument
[all …]
Drsa_importKey.https.any.js81 allValidUsages(vector.publicUsages, []).forEach(function(usages) { argument
89 testFormat(format, algorithm, data, size, usages, extractable);
98 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument
99 testFormat(format, algorithm, data, size, usages, extractable);
112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument
114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages).
117 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'…
135 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages));
141 const usages = [];
143 return subtle.importKey(format, keyData[format], algorithm, extractable, usages).
[all …]
Dec_importKey.https.any.js74 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument
82 testFormat(format, algorithm, data, curve, usages, extractable);
91 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument
92 testFormat(format, algorithm, data, curve, usages, extractable);
104 function testFormat(format, algorithm, data, keySize, usages, extractable) { argument
111 return subtle.importKey(format, keyData, algorithm, extractable, usages).
114 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'…
136 …tring() + " bits " + parameterString(format, compressed, keyData, algorithm, extractable, usages));
143 const usages = [];
145 return subtle.importKey(format, keyData, algorithm, extractable, usages).
[all …]
Dsymmetric_importKey.https.any.js52 allValidUsages(vector.legalUsages, []).forEach(function(usages) { argument
53 … testFormat(format, algorithm, data, keyData.length * 8, usages, extractable);
68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument
70 return subtle.importKey(format, keyData, algorithm, extractable, usages).
73 …gth(key.algorithm) ? { length: keySize, ...algorithm } : algorithm, extractable, usages, 'secret');
91 … keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages));
97 const usages = [];
99 return subtle.importKey(format, keyData, algorithm, extractable, usages).
105 … keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages));
217 function parameterString(format, data, algorithm, extractable, usages) { argument
[all …]
Dokp_importKey.https.any.js75 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument
83 testFormat(format, algorithm, data, vector.name, usages, extractable);
89 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument
94 testFormat(format, algorithm, data, vector.name, usages, extractable);
103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument
105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages).
108 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'…
126 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages));
238 function parameterString(format, data, algorithm, extractable, usages) { argument
249 objectToString(usages) +
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/
DwrapKey_unwrapKey.https.any.js89 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property
90 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property
91 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property
92 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property
93 {algorithm: {name: "HMAC", length: 128, hash: "SHA-256"}, usages: ["sign", "verify"]} property
98 var usages;
100 usages = params.usages;
102 usages = params.publicUsages.concat(params.privateUsages);
105 return subtle.generateKey(params.algorithm, true, usages)
108 …s.push({name: params.algorithm.name, algorithm: params.algorithm, usages: params.usages, key: resu… property
[all …]
/third_party/typescript/tests/baselines/reference/
DconstEnumNoPreserveDeclarationReexport.symbols23 === tests/cases/compiler/usages.ts ===
25 >MyConstEnum : Symbol(MyConstEnum, Decl(usages.ts, 0, 8))
28 >AlsoEnum : Symbol(AlsoEnum, Decl(usages.ts, 1, 6))
31 >StillEnum : Symbol(StillEnum, Decl(usages.ts, 2, 6))
35 >MyConstEnum : Symbol(MyConstEnum, Decl(usages.ts, 0, 8))
40 >AlsoEnum : Symbol(AlsoEnum, Decl(usages.ts, 1, 6))
45 >StillEnum : Symbol(StillEnum, Decl(usages.ts, 2, 6))
/third_party/node/test/pummel/
Dtest-webcrypto-derivebits-pbkdf2.js16 function getDeriveKeyInfo(name, length, hash, ...usages) { argument
17 return [{ name, length, hash }, usages];
529 usages) { argument
542 usages);
559 usages) { argument
573 usages),
587 usages),
602 usages) { argument
611 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), {
622 usages, argument
[all …]
/third_party/skia/third_party/externals/tint/src/reader/spirv/
Dusage_test.cc51 std::vector<Usage> usages(num_usages); in TEST_F() local
52 usages[1].AddSampler(); in TEST_F()
53 usages[2].AddComparisonSampler(); in TEST_F()
54 usages[3].AddTexture(); in TEST_F()
55 usages[4].AddSampledTexture(); in TEST_F()
56 usages[5].AddMultisampledTexture(); in TEST_F()
57 usages[6].AddDepthTexture(); in TEST_F()
58 usages[7].AddStorageReadTexture(); in TEST_F()
59 usages[8].AddStorageWriteTexture(); in TEST_F()
62 const auto& lhs = usages[i]; in TEST_F()
[all …]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/
Dhelpers.js95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) { argument
139 if (usages.includes(usage)) {
145 if (usages.includes(usage)) {
150 correctUsages = usages;
153 assert_equals((typeof key.usages), "object", key.type + " key.usages is an object");
154 assert_not_equals(key.usages, null, key.type + " key.usages isn't null");
159 key.usages.forEach(function(usage) {
163 assert_equals(key.usages.length, usageCount, "usages property is correct");
/third_party/skia/third_party/externals/dawn/src/dawn_native/
DRenderBundleEncoder.cpp148 RenderPassResourceUsage usages = mUsageTracker.AcquireResourceUsage(); in FinishImpl() local
152 DAWN_TRY(ValidateFinish(usages)); in FinishImpl()
156 IsStencilReadOnly(), std::move(usages), in FinishImpl()
160 MaybeError RenderBundleEncoder::ValidateFinish(const RenderPassResourceUsage& usages) const { in ValidateFinish()
163 DAWN_TRY(ValidateSyncScopeResourceUsage(usages)); in ValidateFinish()
DRenderPassEncoder.cpp286 const RenderPassResourceUsage& usages = bundles[i]->GetResourceUsage(); in APIExecuteBundles() local
287 for (uint32_t i = 0; i < usages.buffers.size(); ++i) { in APIExecuteBundles()
288 mUsageTracker.BufferUsedAs(usages.buffers[i], usages.bufferUsages[i]); in APIExecuteBundles()
291 for (uint32_t i = 0; i < usages.textures.size(); ++i) { in APIExecuteBundles()
292 mUsageTracker.AddRenderBundleTextureUsage(usages.textures[i], in APIExecuteBundles()
293 usages.textureUsages[i]); in APIExecuteBundles()
/third_party/vk-gl-cts/external/vulkan-docs/src/appendices/
DVK_NV_extended_sparse_address_space.adoc20 memory resources, but only for a certain set of usages.
22 This extension adds a query for the extended limit, and the supported usages
26 slink:VkImage or slink:VkBuffer uses only usages that are supported.
/third_party/node/lib/internal/crypto/
Dkeys.js665 usages: this.usages,
687 get usages() { getter in CryptoKey
698 usages: kEnumerableProperty, property
733 const usages = this.usages;
739 usages,
746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) { property
749 this[kKeyUsages] = usages;
/third_party/vk-gl-cts/modules/gles2/functional/
Des2fBufferObjectQueryTests.cpp220 const GLenum usages[] = in testBuffer() local
227 for (int ndx = 0; ndx < DE_LENGTH_OF_ARRAY(usages); ++ndx) in testBuffer()
229 glBufferData(m_bufferTarget, 16, DE_NULL, usages[ndx]); in testBuffer()
232 m_verifier->verifyInteger(m_testCtx, m_bufferTarget, GL_BUFFER_USAGE, usages[ndx]); in testBuffer()

123456789