/pki/ |
A D | verify_signed_data.h | 41 SignatureAlgorithm algorithm, der::Input signed_data, 48 SignatureAlgorithm algorithm, der::Input signed_data,
|
A D | simple_path_builder_delegate.cc | 78 SignatureAlgorithm algorithm, CertErrors *errors) { in IsSignatureAlgorithmAcceptable() argument 79 switch (algorithm) { in IsSignatureAlgorithmAcceptable()
|
A D | verify_signed_data.cc | 165 bool VerifySignedData(SignatureAlgorithm algorithm, der::Input signed_data, in VerifySignedData() argument 172 switch (algorithm) { in VerifySignedData() 292 bool VerifySignedData(SignatureAlgorithm algorithm, der::Input signed_data, in VerifySignedData() argument 299 return VerifySignedData(algorithm, signed_data, signature_value, in VerifySignedData()
|
A D | verify_signed_data_unittest.cc | 56 std::string algorithm; in RunTestCase() local 62 {"ALGORITHM", &algorithm}, in RunTestCase() 70 ParseSignatureAlgorithm(StringAsBytes(algorithm)); in RunTestCase()
|
A D | signature_algorithm.h | 67 der::Input input, der::Input *algorithm, der::Input *parameters);
|
A D | signature_algorithm.cc | 286 der::Input *algorithm, in ParseAlgorithmIdentifier() argument 302 if (!algorithm_identifier_parser.ReadTag(CBS_ASN1_OBJECT, algorithm)) { in ParseAlgorithmIdentifier()
|
/pki/testdata/verify_signed_data_unittest/ |
A D | ecdsa-prime256v1-sha512-using-ecdh-key.pem | 2 algorithm OID for the public key has been changed from id-ecPublicKey 5 This test should fail because the public key's algorithm does not match that of 6 the signature algorithm.
|
A D | ecdsa-prime256v1-sha512-using-ecmqv-key.pem | 2 algorithm OID for the public key has been changed from id-ecPublicKey 5 This test should fail because the public key's algorithm does not match that of 6 the signature algorithm.
|
A D | rsa-pkcs1-sha1-using-pss-key-no-params.pem | 2 so that the key algorithm is rsaPss (1.2.840.113549.1.1.10) with absent 6 algorithm for PKCS#1 v1.5.
|
A D | ecdsa-secp384r1-sha256.pem | 21 (4) Extract signature algorithm 23 # Find the offset of the signature algorithm near the end (496 in this case)
|
A D | rsa-pss-sha256-wrong-salt.pem | 2 with a salt length of 33 instead of 32, while the algorithm still reports 17 The signing algorithm:
|
A D | rsa-pkcs1-sha256.pem | 21 (4) Extract signature algorithm 23 # Find the offset of the signature algorithm near the end (491 in this case)
|
A D | rsa2048-pkcs1-sha512.pem | 21 (4) Extract signature algorithm 23 # Find the offset of the signature algorithm near the end (589 in this case)
|
A D | ecdsa-using-rsa-key.pem | 1 This test specifies an ECDSA signature algorithm (and a valid ecdsa signature),
|
A D | ecdsa-prime256v1-sha512-spki-params-null.pem | 2 algorithm has been tampered with. The parameters for ecPublicKey should be a
|
A D | ecdsa-prime256v1-sha512-using-rsa-algorithm.pem | 3 The problem however is the signature algorithm is indicated as being RSA PKCS#1 v1.5.
|
A D | rsa-pkcs1-sha1-key-params-absent.pem | 2 algorithm parameters are absent rather than NULL.
|
A D | rsa-pkcs1-sha1-wrong-algorithm.pem | 2 to have SHA256 instead of SHA1. Using this algorithm verification should fail.
|
A D | rsa-using-ec-key.pem | 1 This test specifies an RSA PKCS#1 v1.5 signature algorithm (and a valid RSA
|
/pki/testdata/verify_certificate_chain_unittest/intermediate-signed-with-sha1/ |
A D | main.test | 8 ERROR: Unacceptable signature algorithm
|
/pki/testdata/verify_certificate_chain_unittest/target-signed-with-sha1/ |
A D | main.test | 8 ERROR: Unacceptable signature algorithm
|
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/ |
A D | 4.1.5.txt | 2 ERROR: Unacceptable signature algorithm
|
A D | 4.1.4.txt | 2 ERROR: Unacceptable signature algorithm
|
A D | 4.1.6.txt | 2 ERROR: Unacceptable signature algorithm
|
/pki/testdata/parse_certificate_unittest/ |
A D | cert_algorithm_not_sequence.pem | 1 This is a synthesized Certificate, where the signature algorithm is an INTEGER
|