| /third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
| D | cfrg_curves_bits.js | 11 Object.keys(kSmallOrderPoint).forEach(function(algorithmName) { argument 12 kSmallOrderPoint[algorithmName].forEach(function(test) { 18 privateKey = await subtle.importKey("pkcs8", pkcs8[algorithmName], 19 {name: algorithmName}, 22 {name: algorithmName}, 24 …derived = await subtle.deriveBits({name: algorithmName, public: publicKey}, privateKey, 8 * sizes[… 31 …}, algorithmName + " key derivation checks for all-zero value result with a key of order " + test.… 41 Object.keys(sizes).forEach(function(algorithmName) { argument 44 …subtle.deriveBits({name: algorithmName, public: publicKeys[algorithmName]}, privateKeys[algorithmN… 46 … assert_true(equalBuffers(derivation, derivations[algorithmName]), "Derived correct bits"); [all …]
|
| D | cfrg_curves_keys.js | 11 Object.keys(kSmallOrderPoint).forEach(function(algorithmName) { argument 12 kSmallOrderPoint[algorithmName].forEach(function(test) { 18 privateKey = await subtle.importKey("pkcs8", pkcs8[algorithmName], 19 {name: algorithmName}, 22 {name: algorithmName}, 24 … derived = await subtle.deriveKey({name: algorithmName, public: publicKey}, privateKey, 33 …}, algorithmName + " deriveBits checks for all-zero value result with a key of order " + test.orde… 38 Object.keys(sizes).forEach(function(algorithmName) { argument 42 … let key = await subtle.generateKey({name: algorithmName}, true, ["deriveKey", "deriveBits"]); 43 …derived = await subtle.deriveKey({name: algorithmName, public: key.publicKey}, key.privateKey, {na… [all …]
|
| /third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
| D | eddsa_vectors.js | 40 ["Ed25519", "Ed448"].forEach(function(algorithmName) { argument 42 name: "EdDSA " + algorithmName, 43 publicKeyBuffer: spki[algorithmName], 46 privateKeyBuffer: pkcs8[algorithmName], 49 algorithmName: algorithmName, property 51 signature: signatures[algorithmName]
|
| D | eddsa.js | 18 var algorithm = {name: vector.algorithmName}; 45 var algorithm = {name: vector.algorithmName}; 71 var algorithm = {name: vector.algorithmName}; 97 var algorithm = {name: vector.algorithmName}; 120 var algorithm = {name: vector.algorithmName}; 144 var algorithm = {name: vector.algorithmName}; 166 var algorithm = {name: vector.algorithmName}; 199 var algorithm = {name: vector.algorithmName}; 236 var algorithm = {name: vector.algorithmName}; 268 var algorithm = {name: vector.algorithmName}; [all …]
|
| D | ecdsa.js | 19 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 46 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 72 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 98 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 121 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 145 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 167 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 200 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 237 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; 269 var algorithm = {name: vector.algorithmName, hash: vector.hashName}; [all …]
|
| D | ecdsa_vectors.js | 71 algorithmName: "ECDSA", property
|
| /third_party/node/test/fixtures/wpt/WebCryptoAPI/util/ |
| D | helpers.js | 170 function allAlgorithmSpecifiersFor(algorithmName) { argument 179 if (algorithmName.toUpperCase().substring(0, 3) === "AES") { 182 results.push({name: algorithmName, length: length}); 184 } else if (algorithmName.toUpperCase() === "HMAC") { 195 results.push({name: algorithmName, ...hashAlgorithm}); 197 } else if (algorithmName.toUpperCase().substring(0, 3) === "RSA") { 199 …results.push({name: algorithmName, hash: hashName, modulusLength: 2048, publicExponent: new Uint8A… 201 } else if (algorithmName.toUpperCase().substring(0, 2) === "EC") { 203 results.push({name: algorithmName, namedCurve: curveName}); 205 …} else if (algorithmName.toUpperCase().substring(0, 1) === "X" || algorithmName.toUpperCase().subs… [all …]
|
| /third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
| D | failures.js | 88 function badAlgorithmPropertySpecifiersFor(algorithmName) { argument 91 if (algorithmName.toUpperCase().substring(0, 3) === "AES") { 94 results.push({name: algorithmName, length: length}); 96 } else if (algorithmName.toUpperCase().substring(0, 3) === "RSA") { 98 …results.push({name: algorithmName, hash: "SHA-256", modulusLength: 1024, publicExponent: publicExp… 100 } else if (algorithmName.toUpperCase().substring(0, 2) === "EC") { 102 results.push({name: algorithmName, namedCurve: curveName});
|
| /third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
| D | wrapKey_unwrapKey.https.any.js | 241 function wrappingIsPossible(exportedKey, algorithmName) { argument 242 if ("byteLength" in exportedKey && algorithmName === "AES-KW") { 246 if ("byteLength" in exportedKey && algorithmName === "RSA-OAEP") { 254 if ("kty" in exportedKey && algorithmName === "AES-KW") { 258 if ("kty" in exportedKey && algorithmName === "RSA-OAEP") {
|
| /third_party/vk-gl-cts/external/vulkancts/modules/vulkan/image/ |
| D | vktImageSampleCompressedTextureTests.cpp | 697 std::string algorithmName = (m_imageFormat == vk::VK_FORMAT_BC3_UNORM_BLOCK) ? "BC3" : "BC1"; in checkSupport() local 698 std::string errorMsg = algorithmName; in checkSupport()
|
| /third_party/vk-gl-cts/external/vulkancts/modules_no_buildgn/vulkan/image/ |
| D | vktImageSampleCompressedTextureTests.cpp | 699 std::string algorithmName = (m_imageFormat == vk::VK_FORMAT_BC3_UNORM_BLOCK) ? "BC3" : "BC1"; in checkSupport() local 700 std::string errorMsg = algorithmName; in checkSupport()
|