| /external/cronet/net/cert/pki/ |
| D | simple_path_builder_delegate_unittest.cc | 25 SignatureAlgorithm* signature_algorithm, in ReadTestCase() argument 43 *signature_algorithm = *sigalg_opt; in ReadTestCase() 63 SignatureAlgorithm signature_algorithm; in TEST_P() local 66 ReadTestCase(GetParam(), &signature_algorithm, &public_key)); in TEST_P() 74 delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors)); in TEST_P() 90 SignatureAlgorithm signature_algorithm; in TEST_P() local 93 ReadTestCase(GetParam(), &signature_algorithm, &public_key)); in TEST_P() 101 delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors)); in TEST_P()
|
| D | verify_signed_data_unittest.cc | 57 absl::optional<SignatureAlgorithm> signature_algorithm = in RunTestCase() local 59 ASSERT_TRUE(signature_algorithm); in RunTestCase() 69 bool result = VerifySignedData(*signature_algorithm, der::Input(&signed_data), in RunTestCase()
|
| /external/python/cryptography/src/cryptography/hazmat/backends/openssl/ |
| D | ec.py | 26 def _check_signature_algorithm(signature_algorithm): argument 27 if not isinstance(signature_algorithm, ec.ECDSA): 159 def signer(self, signature_algorithm): argument 161 _check_signature_algorithm(signature_algorithm) 162 _check_not_prehashed(signature_algorithm.algorithm) 164 self._backend, self, signature_algorithm.algorithm 232 def sign(self, data, signature_algorithm): argument 233 _check_signature_algorithm(signature_algorithm) 235 self._backend, data, signature_algorithm._algorithm 257 def verifier(self, signature, signature_algorithm): argument [all …]
|
| D | dsa.py | 127 def signer(self, signature_algorithm): argument 129 _check_not_prehashed(signature_algorithm) 130 return _DSASignatureContext(self._backend, self, signature_algorithm) 216 def verifier(self, signature, signature_algorithm): argument 220 _check_not_prehashed(signature_algorithm) 222 self._backend, self, signature, signature_algorithm
|
| D | utils.py | 51 def _check_not_prehashed(signature_algorithm): argument 52 if isinstance(signature_algorithm, Prehashed):
|
| /external/cronet/net/test/ |
| D | revocation_builder.cc | 326 absl::optional<SignatureAlgorithm> signature_algorithm) { in BuildOCSPResponseWithResponseData() argument 353 if (!signature_algorithm) in BuildOCSPResponseWithResponseData() 354 signature_algorithm = in BuildOCSPResponseWithResponseData() 356 if (!signature_algorithm) { in BuildOCSPResponseWithResponseData() 361 CertBuilder::SignatureAlgorithmToDer(*signature_algorithm); in BuildOCSPResponseWithResponseData() 370 !CertBuilder::SignData(*signature_algorithm, tbs_response_data, in BuildOCSPResponseWithResponseData() 467 absl::optional<SignatureAlgorithm> signature_algorithm) { in BuildCrl() argument 468 if (!signature_algorithm) { in BuildCrl() 469 signature_algorithm = in BuildCrl() 472 if (!signature_algorithm) { in BuildCrl() [all …]
|
| D | cert_builder.cc | 239 bool CertBuilder::SignData(SignatureAlgorithm signature_algorithm, in SignData() argument 248 switch (signature_algorithm) { in SignData() 315 SignatureAlgorithm signature_algorithm) { in SignatureAlgorithmToDer() argument 316 switch (signature_algorithm) { in SignatureAlgorithmToDer() 874 SignatureAlgorithm signature_algorithm) { in SetSignatureAlgorithm() argument 875 signature_algorithm_ = signature_algorithm; in SetSignatureAlgorithm() 1134 auto signature_algorithm = ParseSignatureAlgorithm(signature_algorithm_tlv); in InitFromCert() local 1135 ASSERT_TRUE(signature_algorithm); in InitFromCert() 1136 signature_algorithm_ = *signature_algorithm; in InitFromCert() 1250 absl::optional<SignatureAlgorithm> signature_algorithm = signature_algorithm_; in GenerateCertificate() local [all …]
|
| D | revocation_builder.h | 56 absl::optional<SignatureAlgorithm> signature_algorithm = absl::nullopt); 66 absl::optional<SignatureAlgorithm> signature_algorithm = absl::nullopt);
|
| /external/cronet/net/third_party/quiche/src/quiche/quic/core/crypto/ |
| D | certificate_view.cc | 85 uint16_t signature_algorithm) { in PublicKeyTypeFromSignatureAlgorithm() argument 88 switch (signature_algorithm) { in PublicKeyTypeFromSignatureAlgorithm() 284 CBS top_certificate, tbs_certificate, signature_algorithm, signature; in ParseSingleCertificate() local 296 !CBS_get_asn1(&top_certificate, &signature_algorithm, in ParseSingleCertificate() 519 uint16_t signature_algorithm) const { in VerifySignature() 520 if (PublicKeyTypeFromSignatureAlgorithm(signature_algorithm) != in VerifySignature() 532 SSL_get_signature_algorithm_digest(signature_algorithm), nullptr, in VerifySignature() 536 if (SSL_is_signature_algorithm_rsa_pss(signature_algorithm)) { in VerifySignature() 613 uint16_t signature_algorithm) const { in Sign() 614 if (!ValidForSignatureAlgorithm(signature_algorithm)) { in Sign() [all …]
|
| D | certificate_view.h | 47 PublicKeyTypeFromSignatureAlgorithm(uint16_t signature_algorithm); 86 uint16_t signature_algorithm) const; 127 std::string Sign(absl::string_view input, uint16_t signature_algorithm) const; 135 bool ValidForSignatureAlgorithm(uint16_t signature_algorithm) const;
|
| /external/cronet/net/ssl/ |
| D | ssl_cipher_suite_names.cc | 48 int ObsoleteSSLStatusForSignature(uint16_t signature_algorithm) { in ObsoleteSSLStatusForSignature() argument 49 switch (signature_algorithm) { in ObsoleteSSLStatusForSignature() 177 int ObsoleteSSLStatus(int connection_status, uint16_t signature_algorithm) { in ObsoleteSSLStatus() argument 186 obsolete_ssl |= ObsoleteSSLStatusForSignature(signature_algorithm); in ObsoleteSSLStatus()
|
| /external/rust/crates/quiche/deps/boringssl/src/ssl/ |
| D | tls13_both.cc | 335 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 336 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 345 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 349 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 359 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 564 uint16_t signature_algorithm; in tls13_add_certificate_verify() local 565 if (!tls1_choose_signature_algorithm(hs, &signature_algorithm)) { in tls13_add_certificate_verify() 574 !CBB_add_u16(&body, signature_algorithm)) { in tls13_add_certificate_verify() 611 signature_algorithm == hints->signature_algorithm && in tls13_add_certificate_verify() 620 hs, sig, &sig_len, max_sig_len, signature_algorithm, msg); in tls13_add_certificate_verify() [all …]
|
| /external/cronet/net/third_party/quiche/src/quiche/quic/test_tools/ |
| D | fake_proof_source_handle.h | 58 uint16_t signature_algorithm, 106 uint16_t signature_algorithm, absl::string_view in, in ComputeSignatureArgs() 111 signature_algorithm(signature_algorithm), in ComputeSignatureArgs() 118 uint16_t signature_algorithm; member
|
| D | fake_proof_source_handle.cc | 42 uint16_t signature_algorithm, absl::string_view in) { in ComputeSignatureNow() argument 45 server_address, client_address, hostname, signature_algorithm, in, in ComputeSignatureNow() 121 uint16_t signature_algorithm, absl::string_view in, in ComputeSignature() argument 128 signature_algorithm, in, max_signature_size)); in ComputeSignature() 147 signature_algorithm, in); in ComputeSignature() 224 args_.signature_algorithm, args_.in); in Run()
|
| D | fake_proof_source.cc | 100 uint16_t signature_algorithm, absl::string_view in, in ComputeTlsSignature() argument 106 signature_algorithm, in, in ComputeTlsSignature() 113 server_address, client_address, hostname, signature_algorithm, in, in ComputeTlsSignature()
|
| /external/rust/crates/x509-cert/tests/ |
| D | certificate.rs | 31 pub signature_algorithm: &'a [u8], field 44 signature_algorithm: reader.tlv_bytes()?, in decode_value() 119 let parsed_sigalg = AlgorithmIdentifier::from_der(defer_cert.signature_algorithm).unwrap(); in reencode_cert() 121 assert_eq!(defer_cert.signature_algorithm, reencoded_sigalg); in reencode_cert() 338 cert.signature_algorithm.oid.to_string(), in decode_cert() 342 cert.signature_algorithm.parameters.unwrap().tag(), in decode_cert() 345 assert_eq!(cert.signature_algorithm.parameters.unwrap().is_null(), true); in decode_cert()
|
| /external/rust/crates/x509-parser/src/ |
| D | certification_request.rs | 22 pub signature_algorithm: AlgorithmIdentifier<'a>, field 47 let signature_alg = &self.signature_algorithm.algorithm; in verify_signature() 87 let (i, signature_algorithm) = AlgorithmIdentifier::from_der(i)?; in from_der() 91 signature_algorithm, in from_der()
|
| /external/cronet/crypto/ |
| D | signature_verifier.cc | 26 bool SignatureVerifier::VerifyInit(SignatureAlgorithm signature_algorithm, in VerifyInit() argument 33 switch (signature_algorithm) { in VerifyInit() 71 if (signature_algorithm == RSA_PSS_SHA256) { in VerifyInit()
|
| /external/cronet/net/cert/ |
| D | x509_util.cc | 200 absl::optional<SignatureAlgorithm> signature_algorithm = in GetTLSServerEndPointChannelBinding() local 202 if (!signature_algorithm) { in GetTLSServerEndPointChannelBinding() 207 GetTlsServerEndpointDigestAlgorithm(*signature_algorithm); in GetTLSServerEndPointChannelBinding() 479 crypto::SignatureVerifier::SignatureAlgorithm signature_algorithm, in SignatureVerifierInitWithCertificate() argument 514 signature_algorithm, signature, in SignatureVerifierInitWithCertificate() 529 absl::optional<SignatureAlgorithm> signature_algorithm = in HasRsaPkcs1Sha1Signature() local 532 return signature_algorithm && in HasRsaPkcs1Sha1Signature() 533 *signature_algorithm == SignatureAlgorithm::kRsaPkcs1Sha1; in HasRsaPkcs1Sha1Signature()
|
| D | signed_certificate_timestamp.cc | 39 pickle->WriteInt(signature.signature_algorithm); in Persist() 71 sct->signature.signature_algorithm = in CreateFromPickle() 95 (signature_algorithm == other_signature_algorithm); in SignatureParametersMatch()
|
| /external/cronet/third_party/boringssl/src/ssl/ |
| D | tls13_both.cc | 328 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 329 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 338 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 342 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 352 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 558 uint16_t signature_algorithm; in tls13_add_certificate_verify() local 559 if (!tls1_choose_signature_algorithm(hs, &signature_algorithm)) { in tls13_add_certificate_verify() 568 !CBB_add_u16(&body, signature_algorithm)) { in tls13_add_certificate_verify() 592 hs, sig, &sig_len, max_sig_len, signature_algorithm, msg); in tls13_add_certificate_verify()
|
| D | ssl_privkey.cc | 232 sigalg == hints->signature_algorithm && // in ssl_private_key_sign() 277 hints->signature_algorithm = sigalg; in ssl_private_key_sign() 490 uint16_t signature_algorithm; member 522 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name() 639 uint16_t signature_algorithm; member 673 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs() 807 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list() 838 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list()
|
| /external/boringssl/src/ssl/ |
| D | tls13_both.cc | 328 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 329 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 338 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 342 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 352 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 558 uint16_t signature_algorithm; in tls13_add_certificate_verify() local 559 if (!tls1_choose_signature_algorithm(hs, &signature_algorithm)) { in tls13_add_certificate_verify() 568 !CBB_add_u16(&body, signature_algorithm)) { in tls13_add_certificate_verify() 592 hs, sig, &sig_len, max_sig_len, signature_algorithm, msg); in tls13_add_certificate_verify()
|
| D | ssl_privkey.cc | 232 sigalg == hints->signature_algorithm && // in ssl_private_key_sign() 277 hints->signature_algorithm = sigalg; in ssl_private_key_sign() 490 uint16_t signature_algorithm; member 522 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name() 639 uint16_t signature_algorithm; member 673 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs() 807 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list() 838 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list()
|
| /external/webrtc/rtc_base/ |
| D | openssl_utility.cc | 95 CBS signature_algorithm; in ParseCertificate() local 96 if (!CBS_get_asn1(&certificate, &signature_algorithm, CBS_ASN1_SEQUENCE)) { in ParseCertificate() 99 if (!CBS_get_asn1(&signature_algorithm, signature_algorithm_oid, in ParseCertificate()
|