/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
D | successes.js | 20 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 21 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 22 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 23 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property 24 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property 25 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property 26 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 27 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property 28 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 29 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property [all …]
|
D | failures.js | 25 …{name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 26 …{name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 27 …{name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], … property 28 … {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, property 29 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, property 30 …{name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsag… property 31 …{name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 32 …{name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapK… property 33 …{name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sig… property 34 …{name: "ECDH", resultType: "CryptoKeyPair", usages: ["deriveKey", "deriveBits"], mandatoryUsag… property [all …]
|
/third_party/node/test/parallel/ |
D | test-webcrypto-keygen.js | 33 usages: [ property 43 usages: [ property 53 usages: [ property 63 usages: [ property 71 usages: [ property 83 usages: [ property 95 usages: [ property 107 usages: [ property 117 usages: [ property 125 usages: [ property [all …]
|
D | test-webcrypto-wrap-unwrap.js | 153 usages: ['encrypt', 'decrypt'], property 161 usages: ['encrypt', 'decrypt'], property 168 usages: ['encrypt', 'decrypt'], property 176 usages: ['wrapKey', 'unwrapKey'], property 185 usages: ['sign', 'verify'], property 191 const usages = 'usages' in params ? 192 params.usages : 195 const keys = await subtle.generateKey(params.algorithm, true, usages); 201 usages: params.publicUsages, 206 usages: params.privateUsages, [all …]
|
D | test-webcrypto-derivebits-hkdf.js | 11 function getDeriveKeyInfo(name, length, hash, ...usages) { argument 12 return [{ name, length, hash }, usages]; 395 usages) { argument 408 usages); 424 usages) { argument 439 usages), 453 usages), 468 usages) { argument 477 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), { 488 usages argument [all …]
|
D | test-webcrypto-export-import-cfrg.js | 116 assert.deepStrictEqual(key.usages, publicUsages); 152 assert.deepStrictEqual(key.usages, privateUsages); 226 assert.deepStrictEqual(publicKey.usages, publicUsages); 227 assert.deepStrictEqual(privateKey.usages, privateUsages); 344 assert.deepStrictEqual(publicKey.usages, publicUsages);
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
D | hkdf_vectors.js | 32 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 33 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property 34 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property 35 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 36 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property 37 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property 38 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 39 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property 40 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property 41 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property [all …]
|
D | pbkdf2_vectors.js | 31 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 32 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, property 33 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, property 34 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 35 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, property 36 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, property 37 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 38 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, property 39 {algorithm: {name: "AES-GCM", length: 256}, usages: ["encrypt", "decrypt"]}, property 40 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property [all …]
|
D | pbkdf2.js | 56 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 76 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 86 … parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 96 …iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages) 187 …ame, iterations: 0}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 219 …rseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
|
D | hkdf.js | 69 …riveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 90 …eKey(badAlgorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 100 ….deriveKey(algorithm, noKey[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 110 …return subtle.deriveKey(algorithm, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages) 222 …riveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
D | okp_importKey_failures.js | 37 function parameterString(format, algorithm, extractable, usages, data) { argument 50 objectToString(usages) + 61 …function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTa… argument 65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages); 71 … }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData)); 101 function validUsages(usages, format, data) { argument 102 if (format === 'spki' || format === 'raw') return usages.publicUsages 103 if (format === 'pkcs8') return usages.privateUsages 107 return data.d === undefined ? usages.publicUsages : usages.privateUsages; 126 … invalidUsages(validUsages(vector, test.format, test.data)).forEach(function(usages) { argument [all …]
|
D | rsa_importKey.https.any.js | 81 allValidUsages(vector.publicUsages, []).forEach(function(usages) { argument 89 testFormat(format, algorithm, data, size, usages, extractable); 98 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 99 testFormat(format, algorithm, data, size, usages, extractable); 112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 117 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 135 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 141 const usages = []; 143 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). [all …]
|
D | ec_importKey.https.any.js | 74 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument 82 testFormat(format, algorithm, data, curve, usages, extractable); 91 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 92 testFormat(format, algorithm, data, curve, usages, extractable); 104 function testFormat(format, algorithm, data, keySize, usages, extractable) { argument 111 return subtle.importKey(format, keyData, algorithm, extractable, usages). 114 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 136 …tring() + " bits " + parameterString(format, compressed, keyData, algorithm, extractable, usages)); 143 const usages = []; 145 return subtle.importKey(format, keyData, algorithm, extractable, usages). [all …]
|
D | symmetric_importKey.https.any.js | 52 allValidUsages(vector.legalUsages, []).forEach(function(usages) { argument 53 … testFormat(format, algorithm, data, keyData.length * 8, usages, extractable); 68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 70 return subtle.importKey(format, keyData, algorithm, extractable, usages). 73 …gth(key.algorithm) ? { length: keySize, ...algorithm } : algorithm, extractable, usages, 'secret'); 91 … keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages)); 97 const usages = []; 99 return subtle.importKey(format, keyData, algorithm, extractable, usages). 105 … keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages)); 217 function parameterString(format, data, algorithm, extractable, usages) { argument [all …]
|
D | okp_importKey.https.any.js | 75 [[]].forEach(function(usages) { // Only valid usages argument is empty array argument 83 testFormat(format, algorithm, data, vector.name, usages, extractable); 89 allValidUsages(vector.privateUsages, []).forEach(function(usages) { argument 94 testFormat(format, algorithm, data, vector.name, usages, extractable); 103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { argument 105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 108 …assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk'… 126 ….toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 238 function parameterString(format, data, algorithm, extractable, usages) { argument 249 objectToString(usages) +
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
D | wrapKey_unwrapKey.https.any.js | 89 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, property 90 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, property 91 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, property 92 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, property 93 {algorithm: {name: "HMAC", length: 128, hash: "SHA-256"}, usages: ["sign", "verify"]} property 98 var usages; 100 usages = params.usages; 102 usages = params.publicUsages.concat(params.privateUsages); 105 return subtle.generateKey(params.algorithm, true, usages) 108 …s.push({name: params.algorithm.name, algorithm: params.algorithm, usages: params.usages, key: resu… property [all …]
|
/third_party/typescript/tests/baselines/reference/ |
D | constEnumNoPreserveDeclarationReexport.symbols | 23 === tests/cases/compiler/usages.ts === 25 >MyConstEnum : Symbol(MyConstEnum, Decl(usages.ts, 0, 8)) 28 >AlsoEnum : Symbol(AlsoEnum, Decl(usages.ts, 1, 6)) 31 >StillEnum : Symbol(StillEnum, Decl(usages.ts, 2, 6)) 35 >MyConstEnum : Symbol(MyConstEnum, Decl(usages.ts, 0, 8)) 40 >AlsoEnum : Symbol(AlsoEnum, Decl(usages.ts, 1, 6)) 45 >StillEnum : Symbol(StillEnum, Decl(usages.ts, 2, 6))
|
/third_party/node/test/pummel/ |
D | test-webcrypto-derivebits-pbkdf2.js | 16 function getDeriveKeyInfo(name, length, hash, ...usages) { argument 17 return [{ name, length, hash }, usages]; 529 usages) { argument 542 usages); 559 usages) { argument 573 usages), 587 usages), 602 usages) { argument 611 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), { 622 usages, argument [all …]
|
/third_party/skia/third_party/externals/tint/src/reader/spirv/ |
D | usage_test.cc | 51 std::vector<Usage> usages(num_usages); in TEST_F() local 52 usages[1].AddSampler(); in TEST_F() 53 usages[2].AddComparisonSampler(); in TEST_F() 54 usages[3].AddTexture(); in TEST_F() 55 usages[4].AddSampledTexture(); in TEST_F() 56 usages[5].AddMultisampledTexture(); in TEST_F() 57 usages[6].AddDepthTexture(); in TEST_F() 58 usages[7].AddStorageReadTexture(); in TEST_F() 59 usages[8].AddStorageWriteTexture(); in TEST_F() 62 const auto& lhs = usages[i]; in TEST_F() [all …]
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/ |
D | helpers.js | 95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) { argument 139 if (usages.includes(usage)) { 145 if (usages.includes(usage)) { 150 correctUsages = usages; 153 assert_equals((typeof key.usages), "object", key.type + " key.usages is an object"); 154 assert_not_equals(key.usages, null, key.type + " key.usages isn't null"); 159 key.usages.forEach(function(usage) { 163 assert_equals(key.usages.length, usageCount, "usages property is correct");
|
/third_party/skia/third_party/externals/dawn/src/dawn_native/ |
D | RenderBundleEncoder.cpp | 148 RenderPassResourceUsage usages = mUsageTracker.AcquireResourceUsage(); in FinishImpl() local 152 DAWN_TRY(ValidateFinish(usages)); in FinishImpl() 156 IsStencilReadOnly(), std::move(usages), in FinishImpl() 160 MaybeError RenderBundleEncoder::ValidateFinish(const RenderPassResourceUsage& usages) const { in ValidateFinish() 163 DAWN_TRY(ValidateSyncScopeResourceUsage(usages)); in ValidateFinish()
|
D | RenderPassEncoder.cpp | 286 const RenderPassResourceUsage& usages = bundles[i]->GetResourceUsage(); in APIExecuteBundles() local 287 for (uint32_t i = 0; i < usages.buffers.size(); ++i) { in APIExecuteBundles() 288 mUsageTracker.BufferUsedAs(usages.buffers[i], usages.bufferUsages[i]); in APIExecuteBundles() 291 for (uint32_t i = 0; i < usages.textures.size(); ++i) { in APIExecuteBundles() 292 mUsageTracker.AddRenderBundleTextureUsage(usages.textures[i], in APIExecuteBundles() 293 usages.textureUsages[i]); in APIExecuteBundles()
|
/third_party/vk-gl-cts/external/vulkan-docs/src/appendices/ |
D | VK_NV_extended_sparse_address_space.adoc | 20 memory resources, but only for a certain set of usages. 22 This extension adds a query for the extended limit, and the supported usages 26 slink:VkImage or slink:VkBuffer uses only usages that are supported.
|
/third_party/node/lib/internal/crypto/ |
D | keys.js | 665 usages: this.usages, 687 get usages() { getter in CryptoKey 698 usages: kEnumerableProperty, property 733 const usages = this.usages; 739 usages, 746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) { property 749 this[kKeyUsages] = usages;
|
/third_party/vk-gl-cts/modules/gles2/functional/ |
D | es2fBufferObjectQueryTests.cpp | 220 const GLenum usages[] = in testBuffer() local 227 for (int ndx = 0; ndx < DE_LENGTH_OF_ARRAY(usages); ++ndx) in testBuffer() 229 glBufferData(m_bufferTarget, 16, DE_NULL, usages[ndx]); in testBuffer() 232 m_verifier->verifyInteger(m_testCtx, m_bufferTarget, GL_BUFFER_USAGE, usages[ndx]); in testBuffer()
|