/third_party/node/test/fixtures/wpt/WebCryptoAPI/digest/ |
H A D | digest.https.any.js | 56 assert_true(equalBuffers(result, digestedData[alg][size]), "digest() yielded expected result for " + alg + ":" + size); 67 assert_true(equalBuffers(result, digestedData[alg][size]), "digest() yielded expected result for " + alg + ":" + size); 78 assert_true(equalBuffers(result, digestedData[alg][size]), "digest() yielded expected result for " + alg + ":" + size); 90 assert_true(equalBuffers(result, digestedData[alg][size]), "digest() yielded expected result for " + alg + ":" + size); 137 function equalBuffers(a, b) { function
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
H A D | cfrg_curves_bits.js | 46 assert_true(equalBuffers(derivation, derivations[algorithmName]), "Derived correct bits"); 56 assert_true(equalBuffers(derivation, derivations[algorithmName]), "Derived correct bits"); 66 assert_true(equalBuffers(derivation, derivations[algorithmName]), "Derived correct bits"); 76 assert_true(equalBuffers(derivation, derivations[algorithmName], 8 * sizes[algorithmName] - 32), "Derived correct bits"); 86 assert_true(equalBuffers(derivation, derivations[algorithmName], 8 * sizes[algorithmName] - 11), "Derived correct bits"); 231 function equalBuffers(a, b, bitCount) {
|
H A D | ecdh_bits.js | 42 assert_true(equalBuffers(derivation, derivations[namedCurve]), "Derived correct bits"); 52 assert_true(equalBuffers(derivation, derivations[namedCurve]), "Derived correct bits"); 62 assert_true(equalBuffers(derivation, derivations[namedCurve]), "Derived correct bits"); 72 assert_true(equalBuffers(derivation, derivations[namedCurve], 8 * sizes[namedCurve] - 32), "Derived correct bits"); 82 assert_true(equalBuffers(derivation, derivations[namedCurve], 8 * sizes[namedCurve] - 11), "Derived correct bits"); 247 function equalBuffers(a, b, bitCount) {
|
H A D | ecdh_keys.js | 43 assert_true(equalBuffers(exportedKey, derivations[namedCurve], 8 * exportedKey.length), "Derived correct key"); 54 assert_true(equalBuffers(exportedKey, derivations[namedCurve], 8 * exportedKey.length), "Derived correct key"); 216 function equalBuffers(a, b, bitCount) {
|
H A D | hkdf.js | 42 assert_true(equalBuffers(derivation, derivations[derivedKeySize][saltSize][hashName][infoSize]), "Derived correct key"); 74 assert_true(equalBuffers(buffer, derivations[derivedKeySize][saltSize][hashName][infoSize].slice(0, derivedKeyType.algorithm.length/8)), "Exported key matches correct value"); 288 function equalBuffers(a, b) {
|
H A D | cfrg_curves_keys.js | 63 assert_true(equalBuffers(exportedKey, derivations[algorithmName], 8 * exportedKey.length), "Derived correct key"); 74 assert_true(equalBuffers(exportedKey, derivations[algorithmName], 8 * exportedKey.length), "Derived correct key"); 215 function equalBuffers(a, b, bitCount) {
|
H A D | pbkdf2.js | 39 assert_true(equalBuffers(derivation, derivations[passwordSize][saltSize][hashName][iterations]), "Derived correct key"); 61 assert_true(equalBuffers(buffer, derivations[passwordSize][saltSize][hashName][iterations].slice(0, derivedKeyType.algorithm.length/8)), "Exported key matches correct value"); 285 function equalBuffers(a, b) {
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/ |
H A D | rsa.js | 26 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 56 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 140 assert_true(equalBuffers(result, vector.plaintext), "Round trip returns original plaintext"); 150 assert_false(equalBuffers(priorCiphertext, ciphertext), "Two encrypts give different results") 185 assert_true(equalBuffers(result, vector.plaintext), "Round trip returns original plaintext"); 195 assert_false(equalBuffers(priorCiphertext, ciphertext), "Two encrypts give different results") 360 function equalBuffers(a, b) {
|
H A D | aes.js | 22 assert_true(equalBuffers(result, vector.result), "Should return expected result"); 46 assert_true(equalBuffers(result, vector.result), "Should return expected result"); 71 assert_true(equalBuffers(result, vector.plaintext), "Should return expected result"); 95 assert_true(equalBuffers(result, vector.plaintext), "Should return expected result"); 307 function equalBuffers(a, b) {
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
H A D | rsa.js | 167 assert_true(equalBuffers(signature, vector.signature), "Signing did not give the expected output"); 183 assert_true(equalBuffers(priorSignature, signature), "Two signings with empty salt give same signature") 185 assert_false(equalBuffers(priorSignature, signature), "Two signings with a salt give different signatures") 420 function equalBuffers(a, b) {
|
H A D | hmac.js | 332 function equalBuffers(a, b) {
|
H A D | ecdsa.js | 491 function equalBuffers(a, b) {
|
H A D | eddsa.js | 416 function equalBuffers(a, b) {
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
H A D | okp_importKey.https.any.js | 116 assert_true(equalBuffers(keyData[format], result), "Round trip works"); 134 function equalBuffers(a, b) { function
|
H A D | symmetric_importKey.https.any.js | 81 assert_true(equalBuffers(keyData, result), "Round trip works"); 113 function equalBuffers(a, b) { function
|
H A D | ec_importKey.https.any.js | 122 assert_true(equalBuffers(data[format], result), "Round trip works"); 159 function equalBuffers(a, b) { function
|
H A D | rsa_importKey.https.any.js | 125 assert_true(equalBuffers(keyData[format], result), "Round trip works"); 157 function equalBuffers(a, b) { function
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
H A D | wrapKey_unwrapKey.https.any.js | 271 return equalBuffers(originalExport, roundTripExport); 278 function equalBuffers(a, b) {
|