/third_party/node/lib/internal/crypto/ |
H A D | cfrg.js | 73 function createCFRGRawKey(name, keyData, isPublic) { 79 if (keyData.byteLength !== 32) { 85 if (keyData.byteLength !== 57) { 91 if (keyData.byteLength !== 56) { 99 if (!handle.initEDRaw(name, keyData, keyType)) { 100 throw lazyDOMException('Invalid keyData', 'DataError'); 199 keyData, 213 key: keyData, 219 'Invalid keyData', { name: 'DataError', cause: err }); 227 key: keyData, [all...] |
H A D | ec.js | 70 function createECPublicKeyRaw(namedCurve, keyData) { 73 if (!handle.initECRaw(kNamedCurveAliases[namedCurve], keyData)) { 74 throw lazyDOMException('Invalid keyData', 'DataError'); 154 keyData, 174 key: keyData, 180 'Invalid keyData', { name: 'DataError', cause: err }); 188 key: keyData, 194 'Invalid keyData', { name: 'DataError', cause: err }); 199 if (!keyData.kty) 200 throw lazyDOMException('Invalid keyData', 'DataErro [all...] |
H A D | mac.js | 87 keyData, 100 const checkLength = keyData.byteLength * 8; 107 // in that we require that algorithm.length match keyData.length * 8 if 114 keyObject = createSecretKey(keyData); 118 if (!keyData.kty) 119 throw lazyDOMException('Invalid keyData', 'DataError'); 121 if (keyData.kty !== 'oct') 125 keyData.use !== undefined && 126 keyData.use !== 'sig') { 130 validateKeyOps(keyData [all...] |
H A D | rsa.js | 203 keyData, 214 key: keyData, 220 'Invalid keyData', { name: 'DataError', cause: err }); 228 key: keyData, 234 'Invalid keyData', { name: 'DataError', cause: err }); 239 if (!keyData.kty) 240 throw lazyDOMException('Invalid keyData', 'DataError'); 242 if (keyData.kty !== 'RSA') 247 keyData.d === undefined, 250 if (usagesSet.size > 0 && keyData [all...] |
H A D | aes.js | 252 keyData, 271 validateKeyLength(keyData.byteLength * 8); 272 keyObject = createSecretKey(keyData); 276 if (!keyData.kty) 277 throw lazyDOMException('Invalid keyData', 'DataError'); 279 if (keyData.kty !== 'oct') 283 keyData.use !== undefined && 284 keyData.use !== 'enc') { 288 validateKeyOps(keyData.key_ops, usagesSet); 290 if (keyData [all...] |
H A D | webcrypto.js | 528 keyData, 549 const checkLength = keyData.byteLength * 8; 553 // in that we require that algorithm.length match keyData.length * 8 if 559 const keyObject = createSecretKey(keyData); 571 keyData, 585 keyData = webidl.converters[type](keyData, { 611 .rsaImportKey(format, keyData, algorithm, extractable, keyUsages); 617 .ecImportKey(format, keyData, algorithm, extractable, keyUsages); 627 .cfrgImportKey(format, keyData, algorith [all...] |
H A D | keys.js | 434 let keyData; 436 keyData = Buffer.from(key.x, 'base64'); 438 keyData = Buffer.from(key.d, 'base64'); 443 if (keyData.byteLength !== 32) { 448 if (keyData.byteLength !== 57) { 453 if (keyData.byteLength !== 56) { 462 if (!handle.initEDRaw(key.crv, keyData, keyType)) {
|
H A D | sig.js | 161 data: keyData, 170 keyData, 267 data: keyData, 276 keyData,
|
/third_party/icu/icu4c/source/common/ |
H A D | uloc_keytype.cpp | 333 LocExtKeyData* keyData = gLocExtKeyDataEntries->create(); in initFromResourceBundle() local 334 if (keyData == NULL) { in initFromResourceBundle() 338 keyData->bcpId = bcpKeyId; in initFromResourceBundle() 339 keyData->legacyId = legacyKeyId; in initFromResourceBundle() 340 keyData->specialTypes = specialTypes; in initFromResourceBundle() 341 keyData->typeMap.adoptInstead(typeDataMap); in initFromResourceBundle() 343 uhash_put(gLocExtKeyMap, (void*)legacyKeyId, keyData, &sts); in initFromResourceBundle() 346 uhash_put(gLocExtKeyMap, (void*)bcpKeyId, keyData, &sts); in initFromResourceBundle() 428 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); in ulocimp_toBcpKey() local 429 if (keyData ! in ulocimp_toBcpKey() 441 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyKey() local 461 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toBcpType() local 506 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyType() local [all...] |
/third_party/node/deps/icu-small/source/common/ |
H A D | uloc_keytype.cpp | 333 LocExtKeyData* keyData = gLocExtKeyDataEntries->create(); in initFromResourceBundle() local 334 if (keyData == nullptr) { in initFromResourceBundle() 338 keyData->bcpId = bcpKeyId; in initFromResourceBundle() 339 keyData->legacyId = legacyKeyId; in initFromResourceBundle() 340 keyData->specialTypes = specialTypes; in initFromResourceBundle() 341 keyData->typeMap.adoptInstead(typeDataMap); in initFromResourceBundle() 343 uhash_put(gLocExtKeyMap, (void*)legacyKeyId, keyData, &sts); in initFromResourceBundle() 346 uhash_put(gLocExtKeyMap, (void*)bcpKeyId, keyData, &sts); in initFromResourceBundle() 428 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); in ulocimp_toBcpKey() local 429 if (keyData ! in ulocimp_toBcpKey() 441 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyKey() local 461 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toBcpType() local 506 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyType() local [all...] |
/third_party/skia/third_party/externals/icu/source/common/ |
H A D | uloc_keytype.cpp | 331 LocExtKeyData* keyData = gLocExtKeyDataEntries->create(); in initFromResourceBundle() local 332 if (keyData == NULL) { in initFromResourceBundle() 336 keyData->bcpId = bcpKeyId; in initFromResourceBundle() 337 keyData->legacyId = legacyKeyId; in initFromResourceBundle() 338 keyData->specialTypes = specialTypes; in initFromResourceBundle() 339 keyData->typeMap.adoptInstead(typeDataMap); in initFromResourceBundle() 341 uhash_put(gLocExtKeyMap, (void*)legacyKeyId, keyData, &sts); in initFromResourceBundle() 344 uhash_put(gLocExtKeyMap, (void*)bcpKeyId, keyData, &sts); in initFromResourceBundle() 426 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); in ulocimp_toBcpKey() local 427 if (keyData ! in ulocimp_toBcpKey() 439 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyKey() local 459 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toBcpType() local 504 LocExtKeyData* keyData = (LocExtKeyData*)uhash_get(gLocExtKeyMap, key); ulocimp_toLegacyType() local [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
H A D | symmetric_importKey.https.any.js | 43 rawKeyData.forEach(function(keyData) { 47 var data = keyData; 49 data = jwkData(keyData, algorithm); 53 testFormat(format, algorithm, data, keyData.length * 8, usages, extractable); 55 testEmptyUsages(format, algorithm, data, keyData.length * 8, extractable); 68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 70 return subtle.importKey(format, keyData, algorithm, extractable, usages). 81 assert_true(equalBuffers(keyData, result), "Round trip works"); 83 assert_true(equalJwk(keyData, result), "Round trip works"); 91 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData, algorith [all...] |
H A D | okp_importKey.https.any.js | 10 var keyData = { 78 var data = keyData[vector.name]; 80 data = {jwk: {kty: keyData[vector.name].jwk.kty, crv: keyData[vector.name].jwk.crv, x: keyData[vector.name].jwk.x}}; 92 var data = keyData[vector.name]; 103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 108 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public'); 116 assert_true(equalBuffers(keyData[forma [all...] |
H A D | rsa_importKey.https.any.js | 14 var keyData = { 84 var data = keyData[size]; 86 data = {jwk: {kty: keyData[size].jwk.kty, n: keyData[size].jwk.n, e: keyData[size].jwk.e}}; 97 var data = keyData[size]; 112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 117 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public'); 125 assert_true(equalBuffers(keyData[forma [all...] |
H A D | ec_importKey.https.any.js | 12 var keyData = { 77 var data = keyData[curve]; 79 data = {jwk: {kty: keyData[curve].jwk.kty, crv: keyData[curve].jwk.crv, x: keyData[curve].jwk.x, y: keyData[curve].jwk.y}}; 90 var data = keyData[curve]; 105 const keyData = data[format]; 111 return subtle.importKey(format, keyData, algorithm, extractable, usages). 114 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData [all...] |
H A D | okp_importKey_failures.js | 61 function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTag) { 65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages); 71 }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData));
|
/third_party/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/locale/ |
H A D | KeyTypeData.java | 132 KeyData keyData = KEYMAP.get(key); in toBcpKey() 133 if (keyData != null) { in toBcpKey() 134 return keyData.bcpId; in toBcpKey() 141 KeyData keyData = KEYMAP.get(key); in toLegacyKey() 142 if (keyData != null) { in toLegacyKey() 143 return keyData.legacyId; in toLegacyKey() 161 KeyData keyData = KEYMAP.get(key); in toBcpType() 162 if (keyData != null) { in toBcpType() 166 Type t = keyData.typeMap.get(type); in toBcpType() 170 if (keyData in toBcpType() [all...] |
/third_party/icu/ohos_icu4j/src/main/java/ohos/global/icu/impl/locale/ |
H A D | KeyTypeData.java | 128 KeyData keyData = KEYMAP.get(key); in toBcpKey() 129 if (keyData != null) { in toBcpKey() 130 return keyData.bcpId; in toBcpKey() 137 KeyData keyData = KEYMAP.get(key); in toLegacyKey() 138 if (keyData != null) { in toLegacyKey() 139 return keyData.legacyId; in toLegacyKey() 157 KeyData keyData = KEYMAP.get(key); in toBcpType() 158 if (keyData != null) { in toBcpType() 162 Type t = keyData.typeMap.get(type); in toBcpType() 166 if (keyData in toBcpType() [all...] |
/third_party/node/test/parallel/ |
H A D | test-webcrypto-export-import-cfrg.js | 13 const keyData = { 110 keyData[name].spki, 124 keyData[name].spki.toString('hex')); 136 keyData[name].spki, 146 keyData[name].pkcs8, 160 keyData[name].pkcs8.toString('hex')); 171 keyData[name].pkcs8, 180 const jwk = keyData[name].jwk; 204 alg: keyData[name].jwsAlg, 215 alg: keyData[nam [all...] |
H A D | test-webcrypto-export-import-ec.js | 15 const keyData = { 105 keyData[namedCurve].spki, 120 keyData[namedCurve].spki.toString('hex')); 132 keyData[namedCurve].spki, 145 keyData[namedCurve].pkcs8, 160 keyData[namedCurve].pkcs8.toString('hex')); 171 keyData[namedCurve].pkcs8, 183 const jwk = keyData[namedCurve].jwk; 208 alg: name === 'ECDSA' ? keyData[namedCurve].jwsAlg : 'ECDH-ES', 220 alg: name === 'ECDSA' ? keyData[namedCurv [all...] |
H A D | test-webcrypto-export-import-rsa.js | 22 const keyData = { 305 keyData[size].spki, 323 keyData[size].spki.toString('hex')); 339 keyData[size].pkcs8, 357 keyData[size].pkcs8.toString('hex')); 368 keyData[size].pkcs8, 381 const jwk = keyData[size].jwk;
|
/third_party/icu/tools/cldr/cldr-to-icu/src/main/java/org/unicode/icu/tool/cldrtoicu/mapper/ |
H A D | Bcp47Mapper.java | 109 IcuData keyData = keyTypeData; in addKeyMapValues() 117 keyData.add(RbPath.parse(bcpKey.substring(1)), key); in addKeyMapValues() 124 keyData.add(RB_KEYMAP.extendBy(key), bcpKey); in addKeyMapValues() 127 keyData.add(RB_TYPE_ALIAS, "/ICUDATA/timezoneTypes/typeAlias/timezone"); in addKeyMapValues() 128 keyData.add(RB_MAP_ALIAS, "/ICUDATA/timezoneTypes/typeMap/timezone"); in addKeyMapValues() 129 keyData.add(RB_BCP_ALIAS, "/ICUDATA/timezoneTypes/bcpTypeAlias/tz"); in addKeyMapValues()
|
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
H A D | root.js | 97 keys = Object.entries(data).reduce((acc, [keyID, keyData]) => ({ 99 [keyID]: key_1.Key.fromJSON(keyID, keyData),
|
H A D | delegations.js | 95 return Object.entries(data).reduce((acc, [keyID, keyData]) => ({ 97 [keyID]: key_1.Key.fromJSON(keyID, keyData),
|
/third_party/skia/src/gpu/ |
H A D | GrProgramDesc.h | 162 static bool BuildFromData(GrProgramDesc* desc, const void* keyData, size_t keyLength) { in BuildFromData() argument 167 memcpy(desc->fKey.begin(), keyData, keyLength); in BuildFromData()
|