Lines Matching refs:crypto

4   common.skip('missing crypto');
10 const crypto = require('crypto');
19 const Sign = crypto.Sign;
26 const Verify = crypto.Verify;
43 crypto.createSign('sha1').sign(
60 crypto.createSign('SHA1')
64 padding: crypto.constants.RSA_PKCS1_OAEP_PADDING
74 () => crypto.createVerify('SHA256').verify({
85 () => crypto.createVerify('SHA256').verify({
97 const s1 = crypto.createSign('SHA1')
100 let s1stream = crypto.createSign('SHA1');
105 const verified = crypto.createVerify('SHA1')
113 const s2 = crypto.createSign('SHA256')
116 let s2stream = crypto.createSign('SHA256');
121 let verified = crypto.createVerify('SHA256')
127 const verStream = crypto.createVerify('SHA256');
136 const s3 = crypto.createSign('SHA1')
139 let verified = crypto.createVerify('SHA1')
145 const verStream = crypto.createVerify('SHA1');
161 case crypto.constants.RSA_PSS_SALTLEN_DIGEST:
163 case crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN:
171 crypto.constants.RSA_PSS_SALTLEN_DIGEST,
172 getEffectiveSaltLength(crypto.constants.RSA_PSS_SALTLEN_DIGEST),
173 crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN,
174 getEffectiveSaltLength(crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN),
179 crypto.constants.RSA_PSS_SALTLEN_DIGEST,
180 getEffectiveSaltLength(crypto.constants.RSA_PSS_SALTLEN_DIGEST),
181 getEffectiveSaltLength(crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN),
192 crypto.createSign(algo)
196 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
201 crypto.sign(algo, data, {
203 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
209 const s4 = crypto.createSign(algo)
213 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
216 const s4_2 = crypto.sign(algo, data, {
218 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
227 verified = crypto.createVerify(algo)
231 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
234 assert.strictEqual(verified, crypto.verify(algo, data, {
236 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
245 verified = crypto.createVerify(algo)
249 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
250 saltLength: crypto.constants.RSA_PSS_SALTLEN_AUTO
253 assert.strictEqual(verified, crypto.verify(algo, data, {
255 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
256 saltLength: crypto.constants.RSA_PSS_SALTLEN_AUTO
261 verified = crypto.createVerify(algo)
265 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
266 saltLength: crypto.constants.RSA_PSS_SALTLEN_AUTO
269 assert.strictEqual(verified, crypto.verify(algo, wrongData, {
271 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
272 saltLength: crypto.constants.RSA_PSS_SALTLEN_AUTO
288 const verified = crypto.createVerify('SHA1')
292 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
312 crypto.createSign('SHA256')
324 crypto.createSign('SHA256')
328 padding: crypto.constants.RSA_PKCS1_PSS_PADDING,
338 crypto.createSign('SHA1')
342 padding: crypto.constants.RSA_PKCS1_OAEP_PADDING
360 crypto.createSign('SHA1').update('Test123').sign(null, 'base64');
368 const sign = crypto.createSign('SHA1');
369 const verify = crypto.createVerify('SHA1');
378 assert.throws(() => crypto.createSign(input), errObj);
379 assert.throws(() => crypto.createVerify(input), errObj);
411 () => crypto.createSign('sha8'),
414 () => crypto.sign('sha8', Buffer.alloc(1), keyPem),
436 const sig = crypto.sign(algo, data, pair.private);
439 assert.strictEqual(crypto.verify(algo, data, pair.private, sig),
441 assert.strictEqual(crypto.verify(algo, data, pair.public, sig),
447 const privKeyObj = crypto.createPrivateKey(pair.private);
448 const pubKeyObj = crypto.createPublicKey(pair.public);
450 const sig = crypto.sign(algo, data, privKeyObj);
453 assert.strictEqual(crypto.verify(algo, data, privKeyObj, sig), true);
454 assert.strictEqual(crypto.verify(algo, data, pubKeyObj, sig), true);
460 const otherSig = crypto.sign(algo, otherData, pair.private);
461 assert.strictEqual(crypto.verify(algo, data, pair.private, otherSig),
469 const sig = crypto.sign(algo, data, pair.private);
470 assert.strictEqual(crypto.verify(algo, data, pair.private, sig),
483 assert.throws(() => crypto.sign(null, input, 'asdf'), errObj);
484 assert.throws(() => crypto.verify(null, input, 'asdf', sig), errObj);
486 assert.throws(() => crypto.sign(null, data, input), errObj);
487 assert.throws(() => crypto.verify(null, data, input, sig), errObj);
492 assert.throws(() => crypto.verify(null, data, 'test', input), errObj);
502 crypto.createSign('sha1').update(data).sign(privKey),
503 crypto.sign('sha1', data, privKey),
504 crypto.sign('sha1', data, { key: privKey, dsaEncoding: 'der' }),
510 crypto.createVerify('sha1').update(data).verify(privKey, sig),
513 assert.strictEqual(crypto.verify('sha1', data, privKey, sig), true);
518 let sig = crypto.sign('sha1', data, opts);
521 assert.strictEqual(crypto.verify('sha1', data, opts, sig), true);
522 assert.strictEqual(crypto.createVerify('sha1')
528 sig = crypto.randomBytes(length + i);
531 result = crypto.verify('sha1', data, opts, sig);
547 crypto.verify('sha256', data, {
555 crypto.createVerify('sha256').update(data).verify({
566 const sig = crypto.sign('sha1', data, {
570 assert.strictEqual(crypto.verify('sha1', data, certPem, sig), true);
572 crypto.verify('sha1', data, {
579 crypto.verify('sha1', data, {
588 crypto.sign('sha1', data, {
610 const s5 = crypto.createSign('SHA256')
614 padding: crypto.constants.RSA_PKCS1_PSS_PADDING
643 const publicKey = crypto.createPublicKey(publicPem);
644 const privateKey = crypto.createPrivateKey(privatePem);
651 const signature = crypto.sign(algo, 'foo', { key, saltLength });
654 const okay = crypto.verify(
676 const publicKey = crypto.createPublicKey(publicPem);
677 const privateKey = crypto.createPrivateKey(privatePem);
682 crypto.sign('sha1', 'foo', key);
688 crypto.sign('sha256', 'foo', { key, saltLength });
694 const signature = crypto.sign('sha256', 'foo', { key, saltLength });
697 const okay = crypto.verify(
718 const publicKey = crypto.createPublicKey(publicPem);
719 const privateKey = crypto.createPrivateKey(privatePem);
730 crypto.sign(algo, 'foo', key);
735 const signature = crypto.sign('sha512', 'foo', key);
738 const okay = crypto.verify('sha512', 'foo', pkey, signature);
750 const { privateKey } = crypto.generateKeyPairSync('rsa', {
753 crypto.sign('sha512', 'message', privateKey);
764 crypto.verify('sha256', 'foo', { key, format: 'jwk' }, Buffer.alloc(0));
767 crypto.createVerify('sha256').verify({ key, format: 'jwk' }, Buffer.alloc(0));
770 crypto.sign('sha256', 'foo', { key, format: 'jwk' });
773 crypto.createSign('sha256').sign({ key, format: 'jwk' });