| /external/cronet/third_party/boringssl/src/pki/ |
| D | simple_path_builder_delegate_unittest.cc | 25 SignatureAlgorithm* signature_algorithm, in ReadTestCase() argument 43 *signature_algorithm = *sigalg_opt; in ReadTestCase() 63 SignatureAlgorithm signature_algorithm{}; in TEST_P() local 66 ReadTestCase(GetParam(), &signature_algorithm, &public_key)); in TEST_P() 74 delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors)); in TEST_P() 90 SignatureAlgorithm signature_algorithm{}; in TEST_P() local 93 ReadTestCase(GetParam(), &signature_algorithm, &public_key)); in TEST_P() 101 delegate.IsSignatureAlgorithmAcceptable(signature_algorithm, &errors)); in TEST_P()
|
| D | verify_signed_data_unittest.cc | 57 std::optional<SignatureAlgorithm> signature_algorithm = in RunTestCase() local 59 ASSERT_TRUE(signature_algorithm); in RunTestCase() 69 bool result = VerifySignedData(*signature_algorithm, der::Input(signed_data), in RunTestCase()
|
| D | crl.cc | 412 std::optional<SignatureAlgorithm> signature_algorithm = in CheckCRL() local 414 if (!signature_algorithm) { in CheckCRL() 422 if (!tbs_alg || *signature_algorithm != *tbs_alg) { in CheckCRL() 604 if (!VerifySignedData(*signature_algorithm, tbs_cert_list_tlv, in CheckCRL()
|
| /external/cronet/net/test/ |
| D | revocation_builder.cc | 329 absl::optional<bssl::SignatureAlgorithm> signature_algorithm) { in BuildOCSPResponseWithResponseData() argument 356 if (!signature_algorithm) in BuildOCSPResponseWithResponseData() 357 signature_algorithm = in BuildOCSPResponseWithResponseData() 359 if (!signature_algorithm) { in BuildOCSPResponseWithResponseData() 364 CertBuilder::SignatureAlgorithmToDer(*signature_algorithm); in BuildOCSPResponseWithResponseData() 373 !CertBuilder::SignData(*signature_algorithm, tbs_response_data, in BuildOCSPResponseWithResponseData() 471 absl::optional<bssl::SignatureAlgorithm> signature_algorithm) { in BuildCrl() argument 472 if (!signature_algorithm) { in BuildCrl() 473 signature_algorithm = in BuildCrl() 476 if (!signature_algorithm) { in BuildCrl() [all …]
|
| D | cert_builder.cc | 273 bool CertBuilder::SignData(bssl::SignatureAlgorithm signature_algorithm, in SignData() argument 282 switch (signature_algorithm) { in SignData() 349 bssl::SignatureAlgorithm signature_algorithm) { in SignatureAlgorithmToDer() argument 350 switch (signature_algorithm) { in SignatureAlgorithmToDer() 918 bssl::SignatureAlgorithm signature_algorithm) { in SetSignatureAlgorithm() argument 919 signature_algorithm_ = signature_algorithm; in SetSignatureAlgorithm() 1195 auto signature_algorithm = in InitFromCert() local 1197 ASSERT_TRUE(signature_algorithm); in InitFromCert() 1198 signature_algorithm_ = *signature_algorithm; in InitFromCert() 1336 sct->signature.signature_algorithm = ct::DigitallySigned::SIG_ALGO_ECDSA; in BuildSctListExtension() [all …]
|
| D | revocation_builder.h | 57 absl::optional<bssl::SignatureAlgorithm> signature_algorithm = 68 signature_algorithm = absl::nullopt);
|
| D | cert_builder.h | 120 static bool SignData(bssl::SignatureAlgorithm signature_algorithm, 133 bssl::SignatureAlgorithm signature_algorithm); 265 void SetSignatureAlgorithm(bssl::SignatureAlgorithm signature_algorithm);
|
| /external/cronet/net/third_party/quiche/src/quiche/quic/core/crypto/ |
| D | certificate_view.cc | 85 uint16_t signature_algorithm) { in PublicKeyTypeFromSignatureAlgorithm() argument 88 switch (signature_algorithm) { in PublicKeyTypeFromSignatureAlgorithm() 284 CBS top_certificate, tbs_certificate, signature_algorithm, signature; in ParseSingleCertificate() local 296 !CBS_get_asn1(&top_certificate, &signature_algorithm, in ParseSingleCertificate() 519 uint16_t signature_algorithm) const { in VerifySignature() 520 if (PublicKeyTypeFromSignatureAlgorithm(signature_algorithm) != in VerifySignature() 532 SSL_get_signature_algorithm_digest(signature_algorithm), nullptr, in VerifySignature() 536 if (SSL_is_signature_algorithm_rsa_pss(signature_algorithm)) { in VerifySignature() 613 uint16_t signature_algorithm) const { in Sign() 614 if (!ValidForSignatureAlgorithm(signature_algorithm)) { in Sign() [all …]
|
| D | certificate_view.h | 47 PublicKeyTypeFromSignatureAlgorithm(uint16_t signature_algorithm); 86 uint16_t signature_algorithm) const; 127 std::string Sign(absl::string_view input, uint16_t signature_algorithm) const; 135 bool ValidForSignatureAlgorithm(uint16_t signature_algorithm) const;
|
| /external/cronet/net/ssl/ |
| D | ssl_cipher_suite_names.cc | 48 int ObsoleteSSLStatusForSignature(uint16_t signature_algorithm) { in ObsoleteSSLStatusForSignature() argument 49 switch (signature_algorithm) { in ObsoleteSSLStatusForSignature() 177 int ObsoleteSSLStatus(int connection_status, uint16_t signature_algorithm) { in ObsoleteSSLStatus() argument 186 obsolete_ssl |= ObsoleteSSLStatusForSignature(signature_algorithm); in ObsoleteSSLStatus()
|
| /external/rust/crates/quiche/deps/boringssl/src/ssl/ |
| D | tls13_both.cc | 335 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 336 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 345 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 349 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 359 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 564 uint16_t signature_algorithm; in tls13_add_certificate_verify() local 565 if (!tls1_choose_signature_algorithm(hs, &signature_algorithm)) { in tls13_add_certificate_verify() 574 !CBB_add_u16(&body, signature_algorithm)) { in tls13_add_certificate_verify() 611 signature_algorithm == hints->signature_algorithm && in tls13_add_certificate_verify() 620 hs, sig, &sig_len, max_sig_len, signature_algorithm, msg); in tls13_add_certificate_verify() [all …]
|
| /external/cronet/net/third_party/quiche/src/quiche/quic/test_tools/ |
| D | fake_proof_source_handle.h | 58 uint16_t signature_algorithm, 106 uint16_t signature_algorithm, absl::string_view in, in ComputeSignatureArgs() 111 signature_algorithm(signature_algorithm), in ComputeSignatureArgs() 118 uint16_t signature_algorithm; member
|
| D | fake_proof_source_handle.cc | 41 uint16_t signature_algorithm, absl::string_view in) { in ComputeSignatureNow() argument 44 server_address, client_address, hostname, signature_algorithm, in, in ComputeSignatureNow() 120 uint16_t signature_algorithm, absl::string_view in, in ComputeSignature() argument 127 signature_algorithm, in, max_signature_size)); in ComputeSignature() 146 signature_algorithm, in); in ComputeSignature() 223 args_.signature_algorithm, args_.in); in Run()
|
| D | fake_proof_source.cc | 100 uint16_t signature_algorithm, absl::string_view in, in ComputeTlsSignature() argument 106 signature_algorithm, in, in ComputeTlsSignature() 113 server_address, client_address, hostname, signature_algorithm, in, in ComputeTlsSignature()
|
| /external/cronet/crypto/ |
| D | signature_verifier.cc | 26 bool SignatureVerifier::VerifyInit(SignatureAlgorithm signature_algorithm, in VerifyInit() argument 33 switch (signature_algorithm) { in VerifyInit() 71 if (signature_algorithm == RSA_PSS_SHA256) { in VerifyInit()
|
| /external/rust/crates/x509-cert/tests/ |
| D | certificate.rs | 35 pub signature_algorithm: &'a [u8], field 48 signature_algorithm: reader.tlv_bytes()?, in decode_value() 123 let parsed_sigalg = AlgorithmIdentifierRef::from_der(defer_cert.signature_algorithm).unwrap(); in reencode_cert() 125 assert_eq!(defer_cert.signature_algorithm, reencoded_sigalg); in reencode_cert() 371 cert.signature_algorithm.oid.to_string(), in decode_cert() 375 cert.signature_algorithm.parameters.as_ref().unwrap().tag(), in decode_cert() 379 .signature_algorithm in decode_cert()
|
| /external/cronet/net/cert/ |
| D | signed_certificate_timestamp.cc | 39 pickle->WriteInt(signature.signature_algorithm); in Persist() 71 sct->signature.signature_algorithm = in CreateFromPickle() 95 (signature_algorithm == other_signature_algorithm); in SignatureParametersMatch()
|
| D | x509_util.cc | 207 std::optional<bssl::SignatureAlgorithm> signature_algorithm = in GetTLSServerEndPointChannelBinding() local 209 if (!signature_algorithm) { in GetTLSServerEndPointChannelBinding() 214 bssl::GetTlsServerEndpointDigestAlgorithm(*signature_algorithm); in GetTLSServerEndPointChannelBinding() 486 crypto::SignatureVerifier::SignatureAlgorithm signature_algorithm, in SignatureVerifierInitWithCertificate() argument 522 signature_algorithm, signature, in SignatureVerifierInitWithCertificate() 537 std::optional<bssl::SignatureAlgorithm> signature_algorithm = in HasRsaPkcs1Sha1Signature() local 540 return signature_algorithm && in HasRsaPkcs1Sha1Signature() 541 *signature_algorithm == bssl::SignatureAlgorithm::kRsaPkcs1Sha1; in HasRsaPkcs1Sha1Signature()
|
| /external/cronet/third_party/boringssl/src/ssl/ |
| D | tls13_both.cc | 328 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 329 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 338 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 342 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 352 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 558 uint16_t signature_algorithm; in tls13_add_certificate_verify() local 559 if (!tls1_choose_signature_algorithm(hs, &signature_algorithm)) { in tls13_add_certificate_verify() 568 !CBB_add_u16(&body, signature_algorithm)) { in tls13_add_certificate_verify() 592 hs, sig, &sig_len, max_sig_len, signature_algorithm, msg); in tls13_add_certificate_verify()
|
| D | ssl_privkey.cc | 233 sigalg == hints->signature_algorithm && // in ssl_private_key_sign() 278 hints->signature_algorithm = sigalg; in ssl_private_key_sign() 489 uint16_t signature_algorithm; member 527 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name() 652 uint16_t signature_algorithm; member 686 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs() 820 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list() 851 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list()
|
| /external/webrtc/rtc_base/ |
| D | openssl_utility.cc | 95 CBS signature_algorithm; in ParseCertificate() local 96 if (!CBS_get_asn1(&certificate, &signature_algorithm, CBS_ASN1_SEQUENCE)) { in ParseCertificate() 99 if (!CBS_get_asn1(&signature_algorithm, signature_algorithm_oid, in ParseCertificate()
|
| /external/boringssl/src/ssl/ |
| D | tls13_both.cc | 328 uint16_t signature_algorithm; in tls13_process_certificate_verify() local 329 if (!CBS_get_u16(&body, &signature_algorithm) || in tls13_process_certificate_verify() 338 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in tls13_process_certificate_verify() 342 hs->new_session->peer_signature_algorithm = signature_algorithm; in tls13_process_certificate_verify() 352 if (!ssl_public_key_verify(ssl, signature, signature_algorithm, in tls13_process_certificate_verify() 556 assert(hs->signature_algorithm != 0); in tls13_add_certificate_verify() 561 !CBB_add_u16(&body, hs->signature_algorithm)) { in tls13_add_certificate_verify() 585 hs, sig, &sig_len, max_sig_len, hs->signature_algorithm, msg); in tls13_add_certificate_verify()
|
| D | ssl_privkey.cc | 219 sigalg == hints->signature_algorithm && // in ssl_private_key_sign() 260 hints->signature_algorithm = sigalg; in ssl_private_key_sign() 454 uint16_t signature_algorithm; member 492 if (candidate.signature_algorithm == sigalg) { in SSL_get_signature_algorithm_name() 636 uint16_t signature_algorithm; member 670 (*out)[i / 2] = candidate.signature_algorithm; in parse_sigalg_pairs() 804 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list() 835 (*out)[out_i++] = candidate.signature_algorithm; in parse_sigalgs_list()
|
| D | handshake_server.cc | 361 uint16_t signature_algorithm = 0; member 418 params.signature_algorithm = sigalg; in choose_params() 889 hs->signature_algorithm = params.signature_algorithm; in do_select_parameters() 1235 uint16_t signature_algorithm; in do_send_server_key_exchange() local 1237 &signature_algorithm)) { in do_send_server_key_exchange() 1242 if (!CBB_add_u16(&body, signature_algorithm)) { in do_send_server_key_exchange() 1259 signature_algorithm, hs->server_params)) { in do_send_server_key_exchange() 1645 uint16_t signature_algorithm = 0; in do_read_client_certificate_verify() local 1647 if (!CBS_get_u16(&certificate_verify, &signature_algorithm)) { in do_read_client_certificate_verify() 1653 if (!tls12_check_peer_sigalg(hs, &alert, signature_algorithm)) { in do_read_client_certificate_verify() [all …]
|
| /external/mbedtls/tests/scripts/ |
| D | generate_tls13_compat_tests.py | 68 def __init__(self, ciphersuite=None, signature_algorithm=None, named_group=None, argument 78 if signature_algorithm: 79 self.add_signature_algorithms(signature_algorithm) 473 signature_algorithm=sig_alg, 477 signature_algorithm=sig_alg,
|