Searched refs:usagesSet (Results 1 – 7 of 7) sorted by relevance
/third_party/node/lib/internal/crypto/ |
D | ec.js | 168 const usagesSet = new SafeSet(keyUsages); 171 verifyAcceptableEcKeyUse(name, true, usagesSet); 185 verifyAcceptableEcKeyUse(name, false, usagesSet); 211 usagesSet); 213 if (usagesSet.size > 0 && keyData.use !== undefined) { 219 validateKeyOps(keyData.key_ops, usagesSet); 252 verifyAcceptableEcKeyUse(name, true, usagesSet);
|
D | cfrg.js | 207 const usagesSet = new SafeSet(keyUsages); 210 verifyAcceptableCfrgKeyUse(name, true, usagesSet); 224 verifyAcceptableCfrgKeyUse(name, false, usagesSet); 247 if (usagesSet.size > 0 && keyData.use !== undefined) { 265 validateKeyOps(keyData.key_ops, usagesSet); 293 usagesSet); 315 verifyAcceptableCfrgKeyUse(name, true, usagesSet);
|
D | aes.js | 228 const usagesSet = new SafeSet(keyUsages); 229 if (hasAnyNotIn(usagesSet, checkUsages)) { 245 ArrayFrom(usagesSet), 260 const usagesSet = new SafeSet(keyUsages); 261 if (hasAnyNotIn(usagesSet, checkUsages)) { 282 if (usagesSet.size > 0 && 288 validateKeyOps(keyData.key_ops, usagesSet);
|
D | rsa.js | 207 const usagesSet = new SafeSet(keyUsages); 211 verifyAcceptableRsaKeyUse(algorithm.name, true, usagesSet); 225 verifyAcceptableRsaKeyUse(algorithm.name, false, usagesSet); 248 usagesSet); 250 if (usagesSet.size > 0 && keyData.use !== undefined) { 256 validateKeyOps(keyData.key_ops, usagesSet);
|
D | mac.js | 91 const usagesSet = new SafeSet(keyUsages); 92 if (hasAnyNotIn(usagesSet, ['sign', 'verify'])) { 124 if (usagesSet.size > 0 && 130 validateKeyOps(keyData.key_ops, usagesSet);
|
D | util.js | 516 function validateKeyOps(keyOps, usagesSet) { argument 536 if (usagesSet !== undefined) { 537 for (const use of usagesSet) {
|
D | webcrypto.js | 531 const usagesSet = new SafeSet(keyUsages); 535 if (hasAnyNotIn(usagesSet, ['deriveKey', 'deriveBits'])) { 543 if (hasAnyNotIn(usagesSet, ['deriveKey', 'deriveBits'])) {
|