/third_party/node/test/fixtures/wpt/WebCryptoAPI/generateKey/ |
H A D | failures.js | 25 {name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 26 {name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 27 {name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 28 {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, 29 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, 30 {name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 31 {name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 32 {name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: ["decrypt", "unwrapKey"]}, 33 {name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 34 {name: "ECDH", resultType: "CryptoKeyPair", usages [all...] |
H A D | successes.js | 20 {name: "AES-CTR", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 21 {name: "AES-CBC", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 22 {name: "AES-GCM", resultType: CryptoKey, usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: []}, 23 {name: "AES-KW", resultType: CryptoKey, usages: ["wrapKey", "unwrapKey"], mandatoryUsages: []}, 24 {name: "HMAC", resultType: CryptoKey, usages: ["sign", "verify"], mandatoryUsages: []}, 25 {name: "RSASSA-PKCS1-v1_5", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 26 {name: "RSA-PSS", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 27 {name: "RSA-OAEP", resultType: "CryptoKeyPair", usages: ["encrypt", "decrypt", "wrapKey", "unwrapKey"], mandatoryUsages: ["decrypt", "unwrapKey"]}, 28 {name: "ECDSA", resultType: "CryptoKeyPair", usages: ["sign", "verify"], mandatoryUsages: ["sign"]}, 29 {name: "ECDH", resultType: "CryptoKeyPair", usages [all...] |
/third_party/node/test/parallel/ |
H A D | test-webcrypto-keygen.js | 33 usages: [ 43 usages: [ 53 usages: [ 63 usages: [ 71 usages: [ 83 usages: [ 95 usages: [ 107 usages: [ 117 usages: [ 125 usages [all...] |
H A D | test-webcrypto-wrap-unwrap.js | 153 usages: ['encrypt', 'decrypt'], 161 usages: ['encrypt', 'decrypt'], 168 usages: ['encrypt', 'decrypt'], 176 usages: ['wrapKey', 'unwrapKey'], 185 usages: ['sign', 'verify'], 191 const usages = 'usages' in params ? 192 params.usages : 195 const keys = await subtle.generateKey(params.algorithm, true, usages); 201 usages [all...] |
H A D | test-webcrypto-derivebits-hkdf.js | 11 function getDeriveKeyInfo(name, length, hash, ...usages) { 12 return [{ name, length, hash }, usages]; 395 usages) { 408 usages); 424 usages) { 439 usages), 453 usages), 468 usages) { 477 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), { 488 usages [all...] |
H A D | test-webcrypto-export-import-cfrg.js | 116 assert.deepStrictEqual(key.usages, publicUsages); 152 assert.deepStrictEqual(key.usages, privateUsages); 174 [/* empty usages */]), 226 assert.deepStrictEqual(publicKey.usages, publicUsages); 227 assert.deepStrictEqual(privateKey.usages, privateUsages); 330 [/* empty usages */]), 344 assert.deepStrictEqual(publicKey.usages, publicUsages);
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/derive_bits_keys/ |
H A D | hkdf_vectors.js | 27 // - baseKey usages missing "deriveBits" (InvalidAccessError) 32 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, 33 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, 34 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, 35 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, 36 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, 37 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, 38 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, 39 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, 40 {algorithm: {name: "AES-GCM", length: 256}, usages [all...] |
H A D | pbkdf2_vectors.js | 26 // - baseKey usages missing "deriveBits" (InvalidAccessError) 31 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, 32 {algorithm: {name: "AES-CBC", length: 192}, usages: ["encrypt", "decrypt"]}, 33 {algorithm: {name: "AES-CBC", length: 256}, usages: ["encrypt", "decrypt"]}, 34 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, 35 {algorithm: {name: "AES-CTR", length: 192}, usages: ["encrypt", "decrypt"]}, 36 {algorithm: {name: "AES-CTR", length: 256}, usages: ["encrypt", "decrypt"]}, 37 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, 38 {algorithm: {name: "AES-GCM", length: 192}, usages: ["encrypt", "decrypt"]}, 39 {algorithm: {name: "AES-GCM", length: 256}, usages [all...] |
H A D | hkdf.js | 69 return subtle.deriveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 90 return subtle.deriveKey(badAlgorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 98 // - baseKey usages missing "deriveKey" (InvalidAccessError) 100 return subtle.deriveKey(algorithm, noKey[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages) 110 return subtle.deriveKey(algorithm, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages) 174 // - baseKey usages missing "deriveBits" (InvalidAccessError) 222 return subtle.deriveKey(algorithm, baseKeys[derivedKeySize], derivedKeyType.algorithm, true, derivedKeyType.usages)
|
H A D | pbkdf2.js | 56 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 76 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: badHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 84 // - baseKey usages missing "deriveKey" (InvalidAccessError) 86 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, noKey[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 96 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: parseInt(iterations)}, wrongKey, derivedKeyType.algorithm, true, derivedKeyType.usages) 148 // - baseKey usages missing "deriveBits" (InvalidAccessError) 187 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: hashName, iterations: 0}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages) 219 return subtle.deriveKey({name: "PBKDF2", salt: salts[saltSize], hash: nonDigestHash, iterations: parseInt(iterations)}, baseKeys[passwordSize], derivedKeyType.algorithm, true, derivedKeyType.usages)
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/import_export/ |
H A D | okp_importKey_failures.js | 37 function parameterString(format, algorithm, extractable, usages, data) { 50 objectToString(usages) + 61 function testError(format, algorithm, keyData, keySize, usages, extractable, expectedError, testTag) { 65 key = await subtle.importKey(format, keyData, algorithm, extractable, usages); 71 }, testTag + ": importKey" + parameterString(format, algorithm, extractable, usages, keyData)); 74 // Don't create an exhaustive list of all invalid usages, 101 function validUsages(usages, format, data) { 102 if (format === 'spki' || format === 'raw') return usages.publicUsages 103 if (format === 'pkcs8') return usages.privateUsages 107 return data.d === undefined ? usages [all...] |
H A D | symmetric_importKey.https.any.js | 19 // combinations of algorithms, usages, parameters, and formats to test 51 // Generate all combinations of valid usages for testing 52 allValidUsages(vector.legalUsages, []).forEach(function(usages) { 53 testFormat(format, algorithm, data, keyData.length * 8, usages, extractable); 68 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 70 return subtle.importKey(format, keyData, algorithm, extractable, usages). 73 assert_goodCryptoKey(key, hasLength(key.algorithm) ? { length: keySize, ...algorithm } : algorithm, extractable, usages, 'secret'); 91 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData, algorithm, extractable, usages)); 94 // Test importKey with a given key format and other parameters but with empty usages. 97 const usages [all...] |
H A D | ec_importKey.https.any.js | 74 [[]].forEach(function(usages) { // Only valid usages argument is empty array 82 testFormat(format, algorithm, data, curve, usages, extractable); 91 allValidUsages(vector.privateUsages, []).forEach(function(usages) { 92 testFormat(format, algorithm, data, curve, usages, extractable); 104 function testFormat(format, algorithm, data, keySize, usages, extractable) { 111 return subtle.importKey(format, keyData, algorithm, extractable, usages). 114 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData.d)) ? 'private' : 'public'); 136 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, compressed, keyData, algorithm, extractable, usages)); 139 // Test importKey with a given key format and other parameters but with empty usages [all...] |
H A D | rsa_importKey.https.any.js | 81 allValidUsages(vector.publicUsages, []).forEach(function(usages) { 89 testFormat(format, algorithm, data, size, usages, extractable); 98 allValidUsages(vector.privateUsages, []).forEach(function(usages) { 99 testFormat(format, algorithm, data, size, usages, extractable); 112 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 114 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 117 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public'); 135 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 138 // Test importKey with a given key format and other parameters but with empty usages. 141 const usages [all...] |
H A D | okp_importKey.https.any.js | 75 [[]].forEach(function(usages) { // Only valid usages argument is empty array 83 testFormat(format, algorithm, data, vector.name, usages, extractable); 89 allValidUsages(vector.privateUsages, []).forEach(function(usages) { 94 testFormat(format, algorithm, data, vector.name, usages, extractable); 103 function testFormat(format, algorithm, keyData, keySize, usages, extractable) { 105 return subtle.importKey(format, keyData[format], algorithm, extractable, usages). 108 assert_goodCryptoKey(key, algorithm, extractable, usages, (format === 'pkcs8' || (format === 'jwk' && keyData[format].d)) ? 'private' : 'public'); 126 }, "Good parameters: " + keySize.toString() + " bits " + parameterString(format, keyData[format], algorithm, extractable, usages)); 197 // Want to test every valid combination of usages [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
H A D | wrapKey_unwrapKey.https.any.js | 89 {algorithm: {name: "AES-CTR", length: 128}, usages: ["encrypt", "decrypt"]}, 90 {algorithm: {name: "AES-CBC", length: 128}, usages: ["encrypt", "decrypt"]}, 91 {algorithm: {name: "AES-GCM", length: 128}, usages: ["encrypt", "decrypt"]}, 92 {algorithm: {name: "AES-KW", length: 128}, usages: ["wrapKey", "unwrapKey"]}, 93 {algorithm: {name: "HMAC", length: 128, hash: "SHA-256"}, usages: ["sign", "verify"]} 98 var usages; 99 if ("usages" in params) { 100 usages = params.usages; 102 usages [all...] |
/third_party/node/test/pummel/ |
H A D | test-webcrypto-derivebits-pbkdf2.js | 16 function getDeriveKeyInfo(name, length, hash, ...usages) { 17 return [{ name, length, hash }, usages]; 529 usages) { 542 usages); 559 usages) { 573 usages), 587 usages), 602 usages) { 611 subtle.deriveKey(algorithm, noKey[size], keyType, true, usages), { 622 usages, [all...] |
/third_party/skia/third_party/externals/tint/src/reader/spirv/ |
H A D | usage_test.cc | 51 std::vector<Usage> usages(num_usages); in TEST_F() 52 usages[1].AddSampler(); in TEST_F() 53 usages[2].AddComparisonSampler(); in TEST_F() 54 usages[3].AddTexture(); in TEST_F() 55 usages[4].AddSampledTexture(); in TEST_F() 56 usages[5].AddMultisampledTexture(); in TEST_F() 57 usages[6].AddDepthTexture(); in TEST_F() 58 usages[7].AddStorageReadTexture(); in TEST_F() 59 usages[8].AddStorageWriteTexture(); in TEST_F() 62 const auto& lhs = usages[ in TEST_F() [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/util/ |
H A D | helpers.js | 93 // Is key a CryptoKey object with correct algorithm, extractable, and usages? 95 function assert_goodCryptoKey(key, algorithm, extractable, usages, kind) { 134 // usages is expected to be provided for a key pair, but we are checking 136 // recognize only some of the usages appropriate for a key pair. 139 if (usages.includes(usage)) { 145 if (usages.includes(usage)) { 150 correctUsages = usages; 153 assert_equals((typeof key.usages), "object", key.type + " key.usages is an object"); 154 assert_not_equals(key.usages, nul [all...] |
/third_party/skia/third_party/externals/dawn/src/dawn_native/ |
H A D | RenderBundleEncoder.cpp | 148 RenderPassResourceUsage usages = mUsageTracker.AcquireResourceUsage(); in FinishImpl() local 152 DAWN_TRY(ValidateFinish(usages)); in FinishImpl() 156 IsStencilReadOnly(), std::move(usages), in FinishImpl() 160 MaybeError RenderBundleEncoder::ValidateFinish(const RenderPassResourceUsage& usages) const { in ValidateFinish() 163 DAWN_TRY(ValidateSyncScopeResourceUsage(usages)); in ValidateFinish()
|
H A D | RenderPassEncoder.cpp | 48 // The usage tracker is passed in here, because it is prepopulated with usages from the 286 const RenderPassResourceUsage& usages = bundles[i]->GetResourceUsage(); in APIExecuteBundles() 287 for (uint32_t i = 0; i < usages.buffers.size(); ++i) { in APIExecuteBundles() 288 mUsageTracker.BufferUsedAs(usages.buffers[i], usages.bufferUsages[i]); in APIExecuteBundles() 291 for (uint32_t i = 0; i < usages.textures.size(); ++i) { in APIExecuteBundles() 292 mUsageTracker.AddRenderBundleTextureUsage(usages.textures[i], in APIExecuteBundles() 293 usages.textureUsages[i]); in APIExecuteBundles()
|
H A D | Queue.cpp | 399 const CommandBufferResourceUsage& usages = commands[i]->GetResourceUsages(); in ValidateSubmit() local 401 for (const SyncScopeResourceUsage& scope : usages.renderPasses) { in ValidateSubmit() 415 for (const ComputePassResourceUsage& pass : usages.computePasses) { in ValidateSubmit() 427 for (const BufferBase* buffer : usages.topLevelBuffers) { in ValidateSubmit() 430 for (const TextureBase* texture : usages.topLevelTextures) { in ValidateSubmit() 433 for (const QuerySetBase* querySet : usages.usedQuerySets) { in ValidateSubmit()
|
/third_party/node/lib/internal/crypto/ |
H A D | keys.js | 665 usages: this.usages, 687 get usages() { 698 usages: kEnumerableProperty, 733 const usages = this.usages; 739 usages, 746 [kDeserialize]({ keyObject, algorithm, usages, extractable }) { 749 this[kKeyUsages] = usages;
|
H A D | util.js | 487 function getUsagesUnion(usageSet, ...usages) { 489 for (let n = 0; n < usages.length; n++) { 490 if (usageSet.has(usages[n])) 491 ArrayPrototypePush(newset, usages[n]);
|
/third_party/vk-gl-cts/modules/gles2/functional/ |
H A D | es2fBufferObjectQueryTests.cpp | 220 const GLenum usages[] = in testBuffer() local 227 for (int ndx = 0; ndx < DE_LENGTH_OF_ARRAY(usages); ++ndx) in testBuffer() 229 glBufferData(m_bufferTarget, 16, DE_NULL, usages[ndx]); in testBuffer() 232 m_verifier->verifyInteger(m_testCtx, m_bufferTarget, GL_BUFFER_USAGE, usages[ndx]); in testBuffer()
|