/third_party/node/test/parallel/ |
H A D | test-webcrypto-export-import-cfrg.js | 23 kty: 'OKP', 40 kty: 'OKP', 57 kty: 'OKP', 74 kty: 'OKP', 189 kty: jwk.kty, 205 kty: jwk.kty, 243 assert.strictEqual(pubJwk.kty, 'OKP'); 249 assert.strictEqual(pvtJwk.kty, 'OK [all...] |
H A D | test-webcrypto-export-import-ec.js | 35 kty: 'EC', 60 kty: 'EC', 80 kty: 'EC', 192 kty: jwk.kty, 209 kty: jwk.kty, 250 assert.strictEqual(pubJwk.kty, 'EC'); 257 assert.strictEqual(pvtJwk.kty, 'EC'); 289 { kty [all...] |
H A D | test-webcrypto-export-import-rsa.js | 51 kty: 'RSA', 121 kty: 'RSA', 244 kty: 'RSA', 390 kty: jwk.kty, 428 assert.strictEqual(pubJwk.kty, 'RSA'); 429 assert.strictEqual(pvtJwk.kty, 'RSA'); 462 { kty: jwk.kty, n: jwk.n, e: jwk.e, use: invalidUse }, 493 { kty [all...] |
H A D | test-crypto-key-objects.js | 148 kty: 'RSA', 150 const publicJwk = { kty: jwk.kty, e: jwk.e, n: jwk.n }; 210 { kty: 'RSA', n: jwk.n, e: jwk.e } 343 kty: 'OKP' 354 kty: 'OKP' 363 kty: 'OKP' 374 kty: 'OKP' 426 kty: 'EC', 437 kty [all...] |
/third_party/libwebsockets/minimal-examples/crypto/minimal-crypto-jwk/ |
H A D | main.c | 71 enum lws_gencrypto_kty kty = LWS_GENCRYPTO_KTY_RSA; in main() local 91 kty = LWS_GENCRYPTO_KTY_RSA; in main() 94 kty = LWS_GENCRYPTO_KTY_OCT; in main() 97 kty = LWS_GENCRYPTO_KTY_EC; in main() 121 if (lws_jwk_generate(context, &jwk, kty, bits, curve)) { in main() 140 kty != LWS_GENCRYPTO_KTY_OCT) { in main()
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
H A D | okp_importKey.https.any.js | 19 kty: "OKP" 31 kty: "OKP" 43 kty: "OKP" 55 kty: "OKP" 80 data = {jwk: {kty: keyData[vector.name].jwk.kty, crv: keyData[vector.name].jwk.crv, x: keyData[vector.name].jwk.x}}; 174 kty: "oct",
|
H A D | ec_importKey.https.any.js | 20 kty: "EC", 35 kty: "EC", 50 kty: "EC", 79 data = {jwk: {kty: keyData[curve].jwk.kty, crv: keyData[curve].jwk.crv, x: keyData[curve].jwk.x, y: keyData[curve].jwk.y}}; 199 kty: "oct",
|
H A D | rsa_importKey.https.any.js | 19 kty: "RSA", 35 kty: "RSA", 51 kty: "RSA", 86 data = {jwk: {kty: keyData[size].jwk.kty, n: keyData[size].jwk.n, e: keyData[size].jwk.e}}; 197 kty: "oct",
|
/third_party/libwebsockets/lib/jose/jwk/ |
H A D | jose_key.c | 52 "kty", /* generic */ 65 "keys[].kty", "keys[].k", /* generic */ 108 { "kty", JWK_META_KTY, 1 }, 118 { "kty", JWK_META_KTY, 1 }, 129 { "kty", JWK_META_KTY, 1 }, 196 * there is no requirement for kty to be given first and eg, in cb_jwk() 198 * order - where kty is not first. in cb_jwk() 226 * kty already makes certain we cannot have key element members in cb_jwk() 259 if (jwk->kty == LWS_GENCRYPTO_KTY_RSA && in cb_jwk() 276 if (jwk->kty in cb_jwk() [all...] |
H A D | jwk.c | 31 "kty", "kid", "use", "key_ops", "x5c", "alg" 61 switch (jwk->kty) { in lws_jwk_dump() 169 jwk->kty = LWS_GENCRYPTO_KTY_OCT; in lws_jwk_dup_oct() 179 enum lws_gencrypto_kty kty, int bits, const char *curve) in lws_jwk_generate() 186 jwk->kty = (int)kty; in lws_jwk_generate() 189 switch (kty) { in lws_jwk_generate() 243 lwsl_err("%s: unknown kty\n", __func__); in lws_jwk_generate() 178 lws_jwk_generate(struct lws_context *context, struct lws_jwk *jwk, enum lws_gencrypto_kty kty, int bits, const char *curve) lws_jwk_generate() argument
|
/third_party/libwebsockets/lib/cose/ |
H A D | cose_key.c | 67 "kty", "kid", "use", "key_ops", "base_iv", "alg" 114 lwsl_cose("%s: cose_key %p, kty: %lld (gc %d)\n", __func__, ck, in lws_cose_key_dump() 115 (long long)ck->kty, ck->gencrypto_kty); in lws_cose_key_dump() 140 lws_cose_key_checks(const lws_cose_key_t *key, int64_t kty, cose_param_t alg, in lws_cose_key_checks() argument 150 assert(kty); in lws_cose_key_checks() 153 assert((kty != LWSCOSE_WKKTV_OKP && kty != LWSCOSE_WKKTV_EC2) || crv); in lws_cose_key_checks() 157 * The 'kty' field MUST be present, and it MUST be '...'. in lws_cose_key_checks() 159 * But kty can come as an int or a string, but we convert well-known in lws_cose_key_checks() 160 * kty int in lws_cose_key_checks() [all...] |
/third_party/libwebsockets/lib/jose/jwe/enc/ |
H A D | aeskw.c | 47 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_OCT) { in lws_jwe_encrypt_aeskw_cbc_hs() 48 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_encrypt_aeskw_cbc_hs() 125 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_OCT) { in lws_jwe_auth_and_decrypt_aeskw_cbc_hs() 126 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_auth_and_decrypt_aeskw_cbc_hs()
|
/third_party/libwebsockets/lib/jose/jwe/ |
H A D | jwe-ecdh-es-aeskw.c | 211 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_EC) { in lws_jwe_encrypt_ecdh() 212 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_encrypt_ecdh() 217 ephem->kty = LWS_GENCRYPTO_KTY_EC; in lws_jwe_encrypt_ecdh() 462 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_EC) { in lws_jwe_auth_and_decrypt_ecdh() 463 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_auth_and_decrypt_ecdh() 468 if (jwe->jose.recipient[jwe->recip].jwk_ephemeral.kty != in lws_jwe_auth_and_decrypt_ecdh()
|
H A D | jwe-rsa-aescbc.c | 54 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_RSA) { in lws_jwe_encrypt_rsa_aes_cbc_hs() 55 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_encrypt_rsa_aes_cbc_hs() 139 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_RSA) { in lws_jwe_auth_and_decrypt_rsa_aes_cbc_hs() 140 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_auth_and_decrypt_rsa_aes_cbc_hs()
|
H A D | jwe-rsa-aesgcm.c | 38 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_RSA) { in lws_jwe_encrypt_rsa_aes_gcm() 39 lwsl_err("%s: wrong kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_encrypt_rsa_aes_gcm() 130 if (jwe->jws.jwk->kty != LWS_GENCRYPTO_KTY_RSA) { in lws_jwe_auth_and_decrypt_rsa_aes_gcm() 131 lwsl_err("%s: unexpected kty %d\n", __func__, jwe->jws.jwk->kty); in lws_jwe_auth_and_decrypt_rsa_aes_gcm()
|
/third_party/node/lib/internal/crypto/ |
H A D | keys.js | 422 key.kty, 'key.kty', ['RSA', 'EC', 'OKP']); 425 if (key.kty === 'OKP') { 469 if (key.kty === 'EC') { 477 kty: key.kty, 501 kty: key.kty,
|
H A D | mac.js | 118 if (!keyData.kty) 121 if (keyData.kty !== 'oct') 122 throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
H A D | aes.js | 276 if (!keyData.kty) 279 if (keyData.kty !== 'oct') 280 throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
H A D | cfrg.js | 238 if (!keyData.kty) 240 if (keyData.kty !== 'OKP') 241 throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
H A D | ec.js | 199 if (!keyData.kty) 201 if (keyData.kty !== 'EC') 202 throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
H A D | rsa.js | 239 if (!keyData.kty) 242 if (keyData.kty !== 'RSA') 243 throw lazyDOMException('Invalid JWK "kty" Parameter', 'DataError');
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/ |
H A D | jws.c | 108 *key_jwk = "{\"kty\":\"oct\",\r\n" 152 if (jwk.kty != LWS_GENCRYPTO_KTY_OCT) { in test_jws_HS256() 153 lwsl_err("%s: unexpected kty %d\n", __func__, jwk.kty); in test_jws_HS256() 233 "{\"kty\":\"RSA\"," 303 if (jwk.kty != LWS_GENCRYPTO_KTY_RSA) { in test_jws_RS256() 304 lwsl_err("%s: 2.2: kty: %d instead of RSA\n", __func__, jwk.kty); in test_jws_RS256() 387 "\"kty\":\"EC\"," 472 if (jwk.kty ! in test_jws_ES256() [all...] |
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-jwk.h | 55 int kty; /**< one of LWS_GENCRYPTO_KTY_ */ member 114 * Sets the kty to OCT, allocates len bytes for K and copies len bytes of key 210 * \param kty: One of the LWS_GENCRYPTO_KTY_ key types 218 enum lws_gencrypto_kty kty, int bits, const char *curve);
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-x509.c | 520 jwk->kty = LWS_GENCRYPTO_KTY_EC; in lws_x509_public_to_jwk() 578 jwk->kty = LWS_GENCRYPTO_KTY_RSA; in lws_x509_public_to_jwk() 691 switch (jwk->kty) { 814 lwsl_err("%s: JWK has unknown kty %d\n", __func__, jwk->kty); 821 if (jwk->kty == LWS_GENCRYPTO_KTY_EC)
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | mbedtls-x509.c | 393 jwk->kty = LWS_GENCRYPTO_KTY_RSA; in lws_x509_public_to_jwk() 411 jwk->kty = LWS_GENCRYPTO_KTY_EC; in lws_x509_public_to_jwk() 481 if (jwk->kty != LWS_GENCRYPTO_KTY_RSA) { in lws_x509_jwk_privkey_pem() 493 if (jwk->kty != LWS_GENCRYPTO_KTY_EC) { in lws_x509_jwk_privkey_pem()
|