Home
last modified time | relevance | path

Searched refs:usages (Results 1 - 25 of 62) sorted by relevance

123

/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/
H A Dfailures.js25 {name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
26 {name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
27 {name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
28 {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []},
29 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []},
30 {name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
31 {name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
32 {name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: ["decrypt", "unwrapKey"]},
33 {name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
34 {name: "ECDH", resultType: "CryptoKeyPair", usages
[all...]
H A Dsuccesses.js20 {name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
21 {name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
22 {name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []},
23 {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []},
24 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []},
25 {name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
26 {name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
27 {name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: ["decrypt", "unwrapKey"]},
28 {name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]},
29 {name: "ECDH", resultType: "CryptoKeyPair", usages
[all...]
/third_party/node/test/parallel/
H A Dtest-webcrypto-keygen.js33 usages: [
43 usages: [
53 usages: [
63 usages: [
71 usages: [
83 usages: [
95 usages: [
107 usages: [
117 usages: [
125 usages
[all...]
H A Dtest-webcrypto-wrap-unwrap.js153 usages: ['encrypt', 'decrypt'],
161 usages: ['encrypt', 'decrypt'],
168 usages: ['encrypt', 'decrypt'],
176 usages: ['wrapKey', 'unwrapKey'],
185 usages: ['sign', 'verify'],
191 const usages = 'usages' in params ?
192 params.usages :
195 const keys = await subtle.generateKey(params.algorithm, true, usages);
201 usages
[all...]
H A Dtest-webcrypto-derivebits-hkdf.js11 function getDeriveKeyInfo(name, length, hash, ...usages) {
12 return [{ name, length, hash }, usages];
395 usages) {
408 usages);
424 usages) {
439 usages),
453 usages),
468 usages) {
477 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), {
488 usages
[all...]
H A Dtest-webcrypto-export-import-cfrg.js116 assert.deepStrictEqual(key.usages, publicUsages);
152 assert.deepStrictEqual(key.usages, privateUsages);
174 [/* empty usages */]),
226 assert.deepStrictEqual(publicKey.usages, publicUsages);
227 assert.deepStrictEqual(privateKey.usages, privateUsages);
330 [/* empty usages */]),
344 assert.deepStrictEqual(publicKey.usages, publicUsages);
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/
H A Dhkdf_vectors.js27 // - baseKey usages missing "deriveBits" (InvalidAccessError)
32 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]},
33 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]},
34 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]},
35 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]},
36 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]},
37 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]},
38 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]},
39 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]},
40 {algorithm: {name: "AES-GCM", length: 256}, usages
[all...]
H A Dpbkdf2_vectors.js26 // - baseKey usages missing "deriveBits" (InvalidAccessError)
31 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]},
32 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]},
33 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]},
34 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]},
35 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]},
36 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]},
37 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]},
38 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]},
39 {algorithm: {name: "AES-GCM", length: 256}, usages
[all...]
H A Dhkdf.js69 return subtle.deriveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
90 return subtle.deriveKey(badAlgorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
98 // - baseKey usages missing "deriveKey" (InvalidAccessError)
100 return subtle.deriveKey(algorithm, noKey[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
110 return subtle.deriveKey(algorithm, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages)
174 // - baseKey usages missing "deriveBits" (InvalidAccessError)
222 return subtle.deriveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
H A Dpbkdf2.js56 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
76 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
84 // - baseKey usages missing "deriveKey" (InvalidAccessError)
86 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
96 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages)
148 // - baseKey usages missing "deriveBits" (InvalidAccessError)
187 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: 0}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
219 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: nonDigestHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/
H A Dokp_importKey_failures.js37 function parameterString(format, algorithm, extractable, usages, data) {
50 objectToString(usages) +
61 function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTag) {
65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages);
71 }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData));
74 // Don't create an exhaustive list of all invalid usages,
101 function validUsages(usages, format, data) {
102 if (format === 'spki' || format === 'raw') return usages.publicUsages
103 if (format === 'pkcs8') return usages.privateUsages
107 return data.d === undefined ? usages
[all...]
H A Dsymmetric_importKey.https.any.js19 // combinations of algorithms, usages, parameters, and formats to test
51 // Generate all combinations of valid usages for testing
52 allValidUsages(vector.legalUsages, []).forEach(function(usages) {
53 testFormat(format, algorithm, data, keyData.length * 8, usages, extractable);
68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) {
70 return subtle.importKey(format, keyData, algorithm, extractable, usages).
73 assert_goodCryptoKey(key, hasLength(key.algorithm) ? { length: keySize, ...algorithm } : algorithm, extractable, usages, 'secret');
91 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages));
94 // Test importKey with a given key format and other parameters but with empty usages.
97 const usages
[all...]
H A Dec_importKey.https.any.js74 [[]].forEach(function(usages) { // Only valid usages argument is empty array
82 testFormat(format, algorithm, data, curve, usages, extractable);
91 allValidUsages(vector.privateUsages, []).forEach(function(usages) {
92 testFormat(format, algorithm, data, curve, usages, extractable);
104 function testFormat(format, algorithm, data, keySize, usages, extractable) {
111 return subtle.importKey(format, keyData, algorithm, extractable, usages).
114 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData.d)) ? 'private' : 'public');
136 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, compressed, keyData, algorithm, extractable, usages));
139 // Test importKey with a given key format and other parameters but with empty usages
[all...]
H A Drsa_importKey.https.any.js81 allValidUsages(vector.publicUsages, []).forEach(function(usages) {
89 testFormat(format, algorithm, data, size, usages, extractable);
98 allValidUsages(vector.privateUsages, []).forEach(function(usages) {
99 testFormat(format, algorithm, data, size, usages, extractable);
112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) {
114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages).
117 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public');
135 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages));
138 // Test importKey with a given key format and other parameters but with empty usages.
141 const usages
[all...]
H A Dokp_importKey.https.any.js75 [[]].forEach(function(usages) { // Only valid usages argument is empty array
83 testFormat(format, algorithm, data, vector.name, usages, extractable);
89 allValidUsages(vector.privateUsages, []).forEach(function(usages) {
94 testFormat(format, algorithm, data, vector.name, usages, extractable);
103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) {
105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages).
108 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public');
126 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages));
197 // Want to test every valid combination of usages
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/
H A DwrapKey_unwrapKey.https.any.js89 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]},
90 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]},
91 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]},
92 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]},
93 {algorithm: {name: "HMAC", length: 128, hash: "SHA-256"}, usages: ["sign", "verify"]}
98 var usages;
99 if ("usages" in params) {
100 usages = params.usages;
102 usages
[all...]
/third_party/node/test/pummel/
H A Dtest-webcrypto-derivebits-pbkdf2.js16 function getDeriveKeyInfo(name, length, hash, ...usages) {
17 return [{ name, length, hash }, usages];
529 usages) {
542 usages);
559 usages) {
573 usages),
587 usages),
602 usages) {
611 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), {
622 usages,
[all...]
/third_party/skia/third_party/externals/tint/src/reader/spirv/
H A Dusage_test.cc51 std::vector<Usage> usages(num_usages); in TEST_F()
52 usages[1].AddSampler(); in TEST_F()
53 usages[2].AddComparisonSampler(); in TEST_F()
54 usages[3].AddTexture(); in TEST_F()
55 usages[4].AddSampledTexture(); in TEST_F()
56 usages[5].AddMultisampledTexture(); in TEST_F()
57 usages[6].AddDepthTexture(); in TEST_F()
58 usages[7].AddStorageReadTexture(); in TEST_F()
59 usages[8].AddStorageWriteTexture(); in TEST_F()
62 const auto& lhs = usages[ in TEST_F()
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/
H A Dhelpers.js93 // Is key a CryptoKey object with correct algorithm, extractable, and usages?
95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) {
134 // usages is expected to be provided for a key pair, but we are checking
136 // recognize only some of the usages appropriate for a key pair.
139 if (usages.includes(usage)) {
145 if (usages.includes(usage)) {
150 correctUsages = usages;
153 assert_equals((typeof key.usages), "object", key.type + " key.usages is an object");
154 assert_not_equals(key.usages, nul
[all...]
/third_party/skia/third_party/externals/dawn/src/dawn_native/
H A DRenderBundleEncoder.cpp148 RenderPassResourceUsage usages = mUsageTracker.AcquireResourceUsage(); in FinishImpl() local
152 DAWN_TRY(ValidateFinish(usages)); in FinishImpl()
156 IsStencilReadOnly(), std::move(usages), in FinishImpl()
160 MaybeError RenderBundleEncoder::ValidateFinish(const RenderPassResourceUsage& usages) const { in ValidateFinish()
163 DAWN_TRY(ValidateSyncScopeResourceUsage(usages)); in ValidateFinish()
H A DRenderPassEncoder.cpp48 // The usage tracker is passed in here, because it is prepopulated with usages from the
286 const RenderPassResourceUsage& usages = bundles[i]->GetResourceUsage(); in APIExecuteBundles()
287 for (uint32_t i = 0; i < usages.buffers.size(); ++i) { in APIExecuteBundles()
288 mUsageTracker.BufferUsedAs(usages.buffers[i], usages.bufferUsages[i]); in APIExecuteBundles()
291 for (uint32_t i = 0; i < usages.textures.size(); ++i) { in APIExecuteBundles()
292 mUsageTracker.AddRenderBundleTextureUsage(usages.textures[i], in APIExecuteBundles()
293 usages.textureUsages[i]); in APIExecuteBundles()
H A DQueue.cpp399 const CommandBufferResourceUsage& usages = commands[i]->GetResourceUsages(); in ValidateSubmit() local
401 for (const SyncScopeResourceUsage& scope : usages.renderPasses) { in ValidateSubmit()
415 for (const ComputePassResourceUsage& pass : usages.computePasses) { in ValidateSubmit()
427 for (const BufferBase* buffer : usages.topLevelBuffers) { in ValidateSubmit()
430 for (const TextureBase* texture : usages.topLevelTextures) { in ValidateSubmit()
433 for (const QuerySetBase* querySet : usages.usedQuerySets) { in ValidateSubmit()
/third_party/node/lib/internal/crypto/
H A Dkeys.js665 usages: this.usages,
687 get usages() {
698 usages: kEnumerableProperty,
733 const usages = this.usages;
739 usages,
746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) {
749 this[kKeyUsages] = usages;
H A Dutil.js487 function getUsagesUnion(usageSet, ...usages) {
489 for (let n = 0; n < usages.length; n++) {
490 if (usageSet.has(usages[n]))
491 ArrayPrototypePush(newset, usages[n]);
/third_party/vk-gl-cts/modules/gles2/functional/
H A Des2fBufferObjectQueryTests.cpp220 const GLenum usages[] = in testBuffer() local
227 for (int ndx = 0; ndx < DE_LENGTH_OF_ARRAY(usages); ++ndx) in testBuffer()
229 glBufferData(m_bufferTarget, 16, DE_NULL, usages[ndx]); in testBuffer()
232 m_verifier->verifyInteger(m_testCtx, m_bufferTarget, GL_BUFFER_USAGE, usages[ndx]); in testBuffer()

Completed in 12 milliseconds

123