/third_party/node/test/fixtures/crypto/ |
H A D | rsa_pss.js | 62 const signatures = { 88 signature: signatures['sha-1, no salt'] 96 signature: signatures['sha-256, no salt'] 104 signature: signatures['sha-384, no salt'] 112 signature: signatures['sha-512, no salt'] 120 signature: signatures['sha-1, salted'] 128 signature: signatures['sha-256, salted'] 136 signature: signatures['sha-384, salted'] 144 signature: signatures['sha-512, salted']
|
H A D | rsa_pkcs.js | 63 const signatures = { 109 signature: signatures['sha-1'] 117 signature: signatures['sha-256'] 125 signature: signatures['sha-384'] 133 signature: signatures['sha-512']
|
H A D | hmac.js | 27 const signatures = { 47 signature: signatures[hash]
|
H A D | eddsa.js | 29 const signatures = { 47 signature: signatures[algorithm],
|
H A D | ecdsa.js | 47 const signatures = { 107 signature: signatures[namedCurve][hash]
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
H A D | rsa_pss_vectors.js | 27 // For verification tests. Note that "salted" signatures use a salt length equal to the hash size 28 var signatures = { 51 signature: signatures["sha-1, no salt"] 64 signature: signatures["sha-256, no salt"] 77 signature: signatures["sha-384, no salt"] 90 signature: signatures["sha-512, no salt"] 103 signature: signatures["sha-1, salted"] 116 signature: signatures["sha-256, salted"] 129 signature: signatures["sha-384, salted"] 142 signature: signatures["sh [all...] |
H A D | rsa_pkcs_vectors.js | 28 var signatures = { 47 signature: signatures["sha-1"] 60 signature: signatures["sha-256"] 73 signature: signatures["sha-384"] 86 signature: signatures["sha-512"]
|
H A D | eddsa_vectors.js | 34 var signatures = { 51 signature: signatures[algorithmName]
|
H A D | hmac_vectors.js | 12 var signatures = { 34 signature: signatures[hashName]
|
/third_party/node/deps/npm/node_modules/@tufjs/models/dist/ |
H A D | metadata.js | 21 * from JSON and to create and verify metadata signatures. 42 constructor(signed, signatures, unrecognizedFields) { 44 this.signatures = signatures || {}; 51 this.signatures = {}; 53 this.signatures[signature.keyID] = signature; 107 util_1.default.isDeepStrictEqual(this.signatures, other.signatures) && 111 const signatures = Object.values(this.signatures) [all...] |
/third_party/node/deps/npm/node_modules/@sigstore/sign/dist/witness/tlog/ |
H A D | entry.js | 87 const sig = util_1.encoding.base64Encode(envelope.signatures[0].sig.toString('base64')); 88 const keyid = envelope.signatures[0].keyid; 96 signatures: [{ sig, publicKey: encodedKey }], 102 dsse.signatures[0].keyid = keyid; 127 signatures: [ 128 { sig: envelope.signatures[0].sig.toString('base64'), publicKey }, 132 if (envelope.signatures[0].keyid.length > 0) { 133 dsse.signatures[0].keyid = envelope.signatures[0].keyid;
|
/third_party/node/deps/npm/node_modules/@sigstore/protobuf-specs/dist/__generated__/ |
H A D | envelope.js | 6 return { payload: Buffer.alloc(0), payloadType: "", signatures: [] }; 13 signatures: Array.isArray(object?.signatures) ? object.signatures.map((e) => exports.Signature.fromJSON(e)) : [], 21 if (message.signatures) { 22 obj.signatures = message.signatures.map((e) => e ? exports.Signature.toJSON(e) : undefined); 25 obj.signatures = [];
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/timestamp/ |
H A D | checkpoint.js | 22 // Separator between the note and the signatures in a checkpoint 24 // Checkpoint signatures are of the following form: 34 // 1. Verify that all signatures in the checkpoint can be verified against a 48 // Verify that the signatures in the checkpoint are all valid 65 // Verifies the signatures in the SignedNote. For each signature, the 68 // Throws an error if any of the signatures are invalid. 71 return signedNote.signatures.every((signature) => { 81 // of a body (or note) and one more signatures calculated over the body. See 84 constructor(note, signatures) { 86 this.signatures [all...] |
/third_party/node/deps/npm/node_modules/pacote/lib/ |
H A D | registry.js | 122 // When verifying signatures, we need to fetch the full/uncompressed 178 if (dist.signatures) { 182 for (const signature of dist.signatures) { 222 mani._signatures = dist.signatures 224 mani._signatures = dist.signatures 244 const keyid = bundle.dsseEnvelope.signatures[0].keyid 245 const signature = bundle.dsseEnvelope.signatures[0].sig
|
/third_party/node/deps/npm/node_modules/@sigstore/verify/dist/tlog/ |
H A D | intoto.js | 36 if (tlogEntry.spec.content.envelope.signatures?.length !== 1) { 43 const tlogSig = base64Decode(tlogEntry.spec.content.envelope.signatures[0].sig);
|
H A D | dsse.js | 36 if (tlogEntry.spec.signatures?.length !== 1) { 42 const tlogSig = tlogEntry.spec.signatures[0].signature;
|
/third_party/node/test/parallel/ |
H A D | test-crypto-psychic-signatures.js | 11 // https://neilmadden.blog/2022/04/19/psychic-signatures-in-java/ 12 // Dubbed "Psychic Signatures", these signatures bypassed the ECDSA signature 45 for (const [encoding, signatures] of Object.entries(vectors)) { 46 for (const signature of signatures) {
|
/third_party/typescript/tests/baselines/reference/tsc/incremental/ |
H A D | when-global-file-is-added,-the-signatures-are-updated.js | 71 Shape signatures in builder refreshed for:: 257 Shape signatures in builder refreshed for:: 378 Shape signatures in builder refreshed for:: 509 Shape signatures in builder refreshed for:: 653 Shape signatures in builder refreshed for:: 802 Shape signatures in builder refreshed for::
|
/third_party/typescript/tests/baselines/reference/tscWatch/programUpdates/updates-errors-in-lib-file/when-module-file-with-global-definitions-changes/ |
H A D | with-skipDefaultLibCheck.js | 53 Shape signatures in builder refreshed for::
106 Shape signatures in builder refreshed for::
161 Shape signatures in builder refreshed for::
|
H A D | with-skipLibCheck.js | 53 Shape signatures in builder refreshed for::
106 Shape signatures in builder refreshed for::
161 Shape signatures in builder refreshed for::
|
/third_party/typescript/tests/baselines/reference/tscWatch/programUpdates/updates-errors-in-lib-file/when-non-module-file-changes/ |
H A D | with-skipDefaultLibCheck.js | 50 Shape signatures in builder refreshed for::
99 Shape signatures in builder refreshed for::
155 Shape signatures in builder refreshed for::
|
H A D | with-skipLibCheck.js | 50 Shape signatures in builder refreshed for::
99 Shape signatures in builder refreshed for::
155 Shape signatures in builder refreshed for::
|
/third_party/typescript/tests/baselines/reference/tscWatch/programUpdates/ |
H A D | updates-errors-correctly-when-declaration-emit-is-disabled-in-compiler-options.js | 51 Shape signatures in builder refreshed for::
112 Shape signatures in builder refreshed for::
167 Shape signatures in builder refreshed for::
232 Shape signatures in builder refreshed for::
287 Shape signatures in builder refreshed for::
|
/third_party/typescript/tests/baselines/reference/tsbuildWatch/reexport/ |
H A D | Reports-errors-correctly.js | 102 Shape signatures in builder refreshed for::
122 Shape signatures in builder refreshed for::
305 Shape signatures in builder refreshed for::
323 Shape signatures in builder refreshed for::
462 Shape signatures in builder refreshed for::
480 Shape signatures in builder refreshed for::
|
/third_party/typescript/tests/baselines/reference/ |
H A D | parserRealSource7.js | 68 for (var i = 0; i < parent.construct.signatures.length; i++) { 70 sig.parameters = parent.construct.signatures[i].parameters; 71 sig.nonOptionalParameterCount = parent.construct.signatures[i].nonOptionalParameterCount; 72 sig.typeCheckStatus = parent.construct.signatures[i].typeCheckStatus; 73 sig.declAST = parent.construct.signatures[i].declAST; 723 fgSym.type.construct.signatures != [] && 724 (fgSym.type.construct.signatures[0].declAST == null || 725 !hasFlag(fgSym.type.construct.signatures[0].declAST.fncFlags, FncFlags.Ambient)) && 896 for (var i = 0; i < parent.construct.signatures.length; i++) {
898 sig.parameters = parent.construct.signatures[ [all...] |