Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 33) sorted by relevance

12

/pki/
A Dverify_signed_data.h41 SignatureAlgorithm algorithm, der::Input signed_data,
48 SignatureAlgorithm algorithm, der::Input signed_data,
A Dsimple_path_builder_delegate.cc78 SignatureAlgorithm algorithm, CertErrors *errors) { in IsSignatureAlgorithmAcceptable() argument
79 switch (algorithm) { in IsSignatureAlgorithmAcceptable()
A Dverify_signed_data.cc165 bool VerifySignedData(SignatureAlgorithm algorithm, der::Input signed_data, in VerifySignedData() argument
172 switch (algorithm) { in VerifySignedData()
292 bool VerifySignedData(SignatureAlgorithm algorithm, der::Input signed_data, in VerifySignedData() argument
299 return VerifySignedData(algorithm, signed_data, signature_value, in VerifySignedData()
A Dverify_signed_data_unittest.cc56 std::string algorithm; in RunTestCase() local
62 {"ALGORITHM", &algorithm}, in RunTestCase()
70 ParseSignatureAlgorithm(StringAsBytes(algorithm)); in RunTestCase()
A Dsignature_algorithm.h67 der::Input input, der::Input *algorithm, der::Input *parameters);
A Dsignature_algorithm.cc286 der::Input *algorithm, in ParseAlgorithmIdentifier() argument
302 if (!algorithm_identifier_parser.ReadTag(CBS_ASN1_OBJECT, algorithm)) { in ParseAlgorithmIdentifier()
/pki/testdata/verify_signed_data_unittest/
A Decdsa-prime256v1-sha512-using-ecdh-key.pem2 algorithm OID for the public key has been changed from id-ecPublicKey
5 This test should fail because the public key's algorithm does not match that of
6 the signature algorithm.
A Decdsa-prime256v1-sha512-using-ecmqv-key.pem2 algorithm OID for the public key has been changed from id-ecPublicKey
5 This test should fail because the public key's algorithm does not match that of
6 the signature algorithm.
A Drsa-pkcs1-sha1-using-pss-key-no-params.pem2 so that the key algorithm is rsaPss (1.2.840.113549.1.1.10) with absent
6 algorithm for PKCS#1 v1.5.
A Decdsa-secp384r1-sha256.pem21 (4) Extract signature algorithm
23 # Find the offset of the signature algorithm near the end (496 in this case)
A Drsa-pss-sha256-wrong-salt.pem2 with a salt length of 33 instead of 32, while the algorithm still reports
17 The signing algorithm:
A Drsa-pkcs1-sha256.pem21 (4) Extract signature algorithm
23 # Find the offset of the signature algorithm near the end (491 in this case)
A Drsa2048-pkcs1-sha512.pem21 (4) Extract signature algorithm
23 # Find the offset of the signature algorithm near the end (589 in this case)
A Decdsa-using-rsa-key.pem1 This test specifies an ECDSA signature algorithm (and a valid ecdsa signature),
A Decdsa-prime256v1-sha512-spki-params-null.pem2 algorithm has been tampered with. The parameters for ecPublicKey should be a
A Decdsa-prime256v1-sha512-using-rsa-algorithm.pem3 The problem however is the signature algorithm is indicated as being RSA PKCS#1 v1.5.
A Drsa-pkcs1-sha1-key-params-absent.pem2 algorithm parameters are absent rather than NULL.
A Drsa-pkcs1-sha1-wrong-algorithm.pem2 to have SHA256 instead of SHA1. Using this algorithm verification should fail.
A Drsa-using-ec-key.pem1 This test specifies an RSA PKCS#1 v1.5 signature algorithm (and a valid RSA
/pki/testdata/verify_certificate_chain_unittest/intermediate-signed-with-sha1/
A Dmain.test8 ERROR: Unacceptable signature algorithm
/pki/testdata/verify_certificate_chain_unittest/target-signed-with-sha1/
A Dmain.test8 ERROR: Unacceptable signature algorithm
/pki/testdata/verify_certificate_chain_unittest/pkits_errors/
A D4.1.5.txt2 ERROR: Unacceptable signature algorithm
A D4.1.4.txt2 ERROR: Unacceptable signature algorithm
A D4.1.6.txt2 ERROR: Unacceptable signature algorithm
/pki/testdata/parse_certificate_unittest/
A Dcert_algorithm_not_sequence.pem1 This is a synthesized Certificate, where the signature algorithm is an INTEGER

Completed in 96 milliseconds

12