SYMBOL INDEX (919 symbols across 112 files) FILE: examples/bundle/main.rs type Cli (line 14) | struct Cli { type Commands (line 24) | enum Commands { type SignArgs (line 32) | struct SignArgs { type VerifyArgs (line 38) | struct VerifyArgs { function main (line 51) | pub fn main() { function sign (line 68) | fn sign(artifact_path: &PathBuf) { function verify (line 112) | fn verify(artifact_path: &PathBuf, identity: &str, issuer: &str) { function authorize (line 139) | fn authorize() -> oauth::IdentityToken { FILE: examples/cosign/sign/main.rs type Cli (line 38) | struct Cli { function run_app (line 68) | async fn run_app(cli: &Cli) -> anyhow::Result<()> { function build_auth (line 139) | fn build_auth(reference: &OciReference) -> Auth { function main (line 165) | pub async fn main() { FILE: examples/cosign/trustroot/main.rs function main (line 5) | pub async fn main() -> Result<()> { FILE: examples/cosign/verify-blob/main.rs type Cli (line 31) | struct Cli { function main (line 49) | pub async fn main() { FILE: examples/cosign/verify-bundle/main.rs type Cli (line 28) | struct Cli { function main (line 50) | pub async fn main() { FILE: examples/cosign/verify/main.rs type Cli (line 43) | struct Cli { function run_app (line 108) | async fn run_app( function fulcio_and_rekor_data (line 231) | async fn fulcio_and_rekor_data(cli: &Cli) -> anyhow::Result Result Result<()> { FILE: examples/key_interface/key_pair_gen_sign_verify/main.rs constant DATA_TO_BE_SIGNED (line 19) | const DATA_TO_BE_SIGNED: &str = "this is an example data to be signed"; function main (line 21) | fn main() -> Result<()> { FILE: examples/key_interface/key_pair_import/main.rs constant PASSWORD (line 22) | const PASSWORD: &str = "password"; constant ECDSA_P256_ASN1_PUBLIC_PEM (line 24) | const ECDSA_P256_ASN1_PUBLIC_PEM: &[u8] = include_bytes!("./ECDSA_P256_A... constant ECDSA_P256_ASN1_PUBLIC_DER (line 25) | const ECDSA_P256_ASN1_PUBLIC_DER: &[u8] = include_bytes!("./ECDSA_P256_A... constant ECDSA_P256_ASN1_PRIVATE_PEM (line 26) | const ECDSA_P256_ASN1_PRIVATE_PEM: &[u8] = include_bytes!("./ECDSA_P256_... constant ECDSA_P256_ASN1_PRIVATE_DER (line 27) | const ECDSA_P256_ASN1_PRIVATE_DER: &[u8] = include_bytes!("./ECDSA_P256_... constant ECDSA_P256_ASN1_ENCRYPTED_PRIVATE_PEM (line 28) | const ECDSA_P256_ASN1_ENCRYPTED_PRIVATE_PEM: &[u8] = function main (line 31) | fn main() -> Result<()> { FILE: examples/openidflow/openidconnect/main.rs function main (line 19) | fn main() -> Result<(), anyhow::Error> { FILE: examples/rekor/create_log_entry/main.rs function create_signer (line 29) | async fn create_signer() -> SigStoreSigner { function get_file_sha256sum (line 36) | async fn get_file_sha256sum(url: String) -> Result<(Vec, String), re... function main (line 45) | async fn main() { FILE: examples/rekor/get_log_entry_by_index/main.rs function main (line 22) | async fn main() { FILE: examples/rekor/get_log_entry_by_uuid/main.rs function main (line 21) | async fn main() { FILE: examples/rekor/get_log_info/main.rs function main (line 20) | async fn main() { FILE: examples/rekor/get_log_proof/main.rs function main (line 22) | async fn main() { FILE: examples/rekor/get_public_key/main.rs function main (line 22) | async fn main() { FILE: examples/rekor/merkle_proofs/consistency.rs type Args (line 9) | struct Args { function main (line 21) | async fn main() -> Result<(), Box> { FILE: examples/rekor/merkle_proofs/inclusion.rs type Args (line 9) | struct Args { function main (line 17) | async fn main() -> Result<(), Box> { FILE: examples/rekor/search_index/main.rs function main (line 23) | async fn main() { FILE: examples/rekor/search_log_query/main.rs function main (line 25) | async fn main() { FILE: src/bundle/models.rs type Version (line 15) | pub enum Version { method fmt (line 21) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { type Err (line 30) | type Err = (); method from_str (line 32) | fn from_str(s: &str) -> Result { function decode_hex (line 42) | fn decode_hex>(hex: S) -> Result, ()> { type Error (line 47) | type Error = (); method try_from (line 49) | fn try_from(value: RekorInclusionProof) -> Result { type Error (line 70) | type Error = (); method try_from (line 72) | fn try_from(value: RekorLogEntry) -> Result { FILE: src/bundle/sign.rs type SigningSession (line 65) | pub struct SigningSession<'ctx> { function new (line 73) | async fn new( function materials (line 86) | async fn materials( function is_expired (line 122) | pub fn is_expired(&self) -> bool { function sign_digest (line 134) | async fn sign_digest(&self, hasher: Sha256) -> SigstoreResult( type SigningSession (line 223) | pub struct SigningSession<'ctx> { function new (line 229) | pub(crate) fn new(ctx: &'ctx SigningContext, token: IdentityToken) -> Si... function is_expired (line 241) | pub fn is_expired(&self) -> bool { function sign (line 247) | pub fn sign(&self, mut input: R) -> SigstoreResult SigstoreResult { method production (line 302) | pub fn production() -> SigstoreResult { method signer (line 311) | pub async fn signer( method blocking_signer (line 321) | pub fn blocking_signer( type SigningArtifact (line 330) | pub struct SigningArtifact { method to_bundle (line 341) | pub fn to_bundle(self) -> Bundle { FILE: src/bundle/verify/models.rs type Bundle01ProfileErrorKind (line 39) | pub enum Bundle01ProfileErrorKind { type Bundle02ProfileErrorKind (line 45) | pub enum Bundle02ProfileErrorKind { type BundleProfileErrorKind (line 55) | pub enum BundleProfileErrorKind { type BundleErrorKind (line 65) | pub enum BundleErrorKind { type CertificateErrorKind (line 98) | pub enum CertificateErrorKind { type SignatureErrorKind (line 113) | pub enum SignatureErrorKind { type VerificationError (line 126) | pub enum VerificationError { type VerificationResult (line 139) | pub type VerificationResult = Result<(), VerificationError>; type CheckedBundle (line 141) | pub struct CheckedBundle { type Error (line 149) | type Error = BundleErrorKind; method try_from (line 151) | fn try_from(input: Bundle) -> Result { method tlog_entry (line 256) | pub fn tlog_entry(&self, offline: bool, input_digest: &[u8]) -> Option... FILE: src/bundle/verify/policy.rs type PolicyError (line 67) | pub enum PolicyError { type PolicyResult (line 91) | pub type PolicyResult = Result<(), PolicyError>; type SingleX509ExtPolicy (line 94) | pub trait SingleX509ExtPolicy { method new (line 95) | fn new>(val: S) -> Self; method name (line 96) | fn name() -> &'static str; method value (line 97) | fn value(&self) -> &str; type VerificationPolicy (line 163) | pub trait VerificationPolicy { method verify (line 101) | fn verify(&self, cert: &x509_cert::Certificate) -> PolicyResult { method verify (line 164) | fn verify(&self, cert: &x509_cert::Certificate) -> PolicyResult; method verify (line 186) | fn verify(&self, cert: &x509_cert::Certificate) -> PolicyResult { method verify (line 225) | fn verify(&self, cert: &x509_cert::Certificate) -> PolicyResult { method verify (line 264) | fn verify(&self, cert: &x509_cert::Certificate) -> PolicyResult { type AnyOf (line 170) | pub struct AnyOf<'a> { function new (line 175) | pub fn new(policies: I) -> Self type AllOf (line 201) | pub struct AllOf<'a> { function new (line 206) | pub fn new(policies: I) -> Option type Identity (line 245) | pub struct Identity { method new (line 251) | pub fn new(identity: A, issuer: B) -> Self FILE: src/bundle/verify/verifier.rs type Verifier (line 49) | pub struct Verifier { method new (line 60) | pub fn new( method verify_digest (line 76) | pub async fn verify_digest

( method verify (line 187) | pub async fn verify( method production (line 221) | pub async fn production() -> SigstoreResult { method new (line 241) | pub fn new( method verify_digest (line 255) | pub fn verify_digest

( method verify (line 273) | pub fn verify( method production (line 295) | pub fn production() -> SigstoreResult { type Verifier (line 232) | pub struct Verifier { method new (line 60) | pub fn new( method verify_digest (line 76) | pub async fn verify_digest

( method verify (line 187) | pub async fn verify( method production (line 221) | pub async fn production() -> SigstoreResult { method new (line 241) | pub fn new( method verify_digest (line 255) | pub fn verify_digest

( method verify (line 273) | pub fn verify( method production (line 295) | pub fn production() -> SigstoreResult { FILE: src/cosign/bundle.rs type SignedArtifactBundle (line 33) | pub struct SignedArtifactBundle { method new_verified (line 48) | pub fn new_verified( type Bundle (line 61) | pub struct Bundle { method new_verified (line 71) | pub(crate) fn new_verified( method verify_bundle (line 85) | pub(crate) fn verify_bundle( type Payload (line 109) | pub struct Payload { function build_correct_bundle (line 125) | fn build_correct_bundle() -> String { function bundle_new_verified_success (line 139) | fn bundle_new_verified_success() { function bundle_new_verified_failure_because_different_key_signed_the_bundle (line 150) | fn bundle_new_verified_failure_because_different_key_signed_the_bundle() { function bundle_new_verified_failure_because_rekor_key_id_is_unknown (line 168) | fn bundle_new_verified_failure_because_rekor_key_id_is_unknown() { function signedartifactbundle_new_verified_success (line 183) | fn signedartifactbundle_new_verified_success() { FILE: src/cosign/client.rs constant CONFIG_DATA (line 35) | pub const CONFIG_DATA: &str = "{}"; type Client (line 40) | pub struct Client { method fetch_manifest_and_layers (line 144) | async fn fetch_manifest_and_layers( method triangulate (line 49) | async fn triangulate( method trusted_signature_layers (line 68) | async fn trusted_signature_layers( method push_signature (line 97) | async fn push_signature( function build_test_client (line 181) | fn build_test_client(mock_client: MockOciClient) -> Client { function triangulate_sigstore_object (line 193) | async fn triangulate_sigstore_object() { FILE: src/cosign/client_builder.rs type ClientBuilder (line 58) | pub struct ClientBuilder<'a> { function enable_registry_caching (line 70) | pub fn enable_registry_caching(mut self) -> Self { function with_trust_repository (line 79) | pub fn with_trust_repository(mut self, repo: &'a ... function with_oci_client_config (line 93) | pub fn with_oci_client_config(mut self, config: ClientConfig) -> Self { function build (line 98) | pub fn build(self) -> Result { constant OLD_REKOR_ED25519_KEY_DER (line 159) | const OLD_REKOR_ED25519_KEY_DER: &[u8] = &[ constant OLD_REKOR_ED25519_KEY_ID (line 165) | const OLD_REKOR_ED25519_KEY_ID: &str = function client_builder_parses_ed25519_rekor_key (line 172) | fn client_builder_parses_ed25519_rekor_key() { FILE: src/cosign/constants.rs constant SIGSTORE_ISSUER_OID (line 18) | pub(crate) const SIGSTORE_ISSUER_OID: ObjectIdentifier = constant SIGSTORE_GITHUB_WORKFLOW_TRIGGER_OID (line 20) | pub(crate) const SIGSTORE_GITHUB_WORKFLOW_TRIGGER_OID: ObjectIdentifier = constant SIGSTORE_GITHUB_WORKFLOW_SHA_OID (line 22) | pub(crate) const SIGSTORE_GITHUB_WORKFLOW_SHA_OID: ObjectIdentifier = constant SIGSTORE_GITHUB_WORKFLOW_NAME_OID (line 24) | pub(crate) const SIGSTORE_GITHUB_WORKFLOW_NAME_OID: ObjectIdentifier = constant SIGSTORE_GITHUB_WORKFLOW_REPOSITORY_OID (line 26) | pub(crate) const SIGSTORE_GITHUB_WORKFLOW_REPOSITORY_OID: ObjectIdentifi... constant SIGSTORE_GITHUB_WORKFLOW_REF_OID (line 28) | pub(crate) const SIGSTORE_GITHUB_WORKFLOW_REF_OID: ObjectIdentifier = constant ED25519 (line 31) | pub(crate) const ED25519: ObjectIdentifier = ObjectIdentifier::new_unwra... constant SIGSTORE_OCI_MEDIA_TYPE (line 33) | pub(crate) const SIGSTORE_OCI_MEDIA_TYPE: &str = "application/vnd.dev.co... constant SIGSTORE_SIGNATURE_ANNOTATION (line 34) | pub(crate) const SIGSTORE_SIGNATURE_ANNOTATION: &str = "dev.cosignprojec... constant SIGSTORE_BUNDLE_ANNOTATION (line 35) | pub(crate) const SIGSTORE_BUNDLE_ANNOTATION: &str = "dev.sigstore.cosign... constant SIGSTORE_CERT_ANNOTATION (line 36) | pub(crate) const SIGSTORE_CERT_ANNOTATION: &str = "dev.sigstore.cosign/c... FILE: src/cosign/constraint/annotation.rs type AnnotationMarker (line 36) | pub struct AnnotationMarker { method new (line 41) | pub fn new(annotations: HashMap) -> Self { method add_constraint (line 47) | fn add_constraint(&self, signature_layer: &mut SignatureLayer) -> Result... FILE: src/cosign/constraint/mod.rs type SignConstraintVec (line 37) | pub type SignConstraintVec = Vec>; type SignConstraintRefVec (line 38) | pub type SignConstraintRefVec<'a> = Vec<&'a Box>; type Constraint (line 40) | pub trait Constraint: std::fmt::Debug { method add_constraint (line 66) | fn add_constraint(&self, signature_layer: &mut SignatureLayer) -> Resu... FILE: src/cosign/constraint/signature.rs type PrivateKeySigner (line 34) | pub struct PrivateKeySigner { method new_with_raw (line 41) | pub fn new_with_raw( method new_with_signer (line 57) | pub fn new_with_signer(signer: SigStoreSigner) -> Self { method add_constraint (line 63) | fn add_constraint(&self, signature_layer: &mut SignatureLayer) -> Result... FILE: src/cosign/mod.rs type CosignCapabilities (line 77) | pub trait CosignCapabilities { method triangulate (line 80) | async fn triangulate( method trusted_signature_layers (line 119) | async fn trusted_signature_layers( method push_signature (line 146) | async fn push_signature( method verify_blob (line 163) | fn verify_blob(cert: &str, signature: &str, blob: &[u8]) -> Result<()> { method verify_blob_with_public_key (line 184) | fn verify_blob_with_public_key(public_key: &str, signature: &str, blob... function verify_constraints (line 206) | pub fn verify_constraints<'a, 'b, I>( function apply_constraints (line 256) | pub fn apply_constraints<'a, 'b, I>( constant REKOR_PUB_KEY (line 302) | pub(crate) const REKOR_PUB_KEY: &str = r#"-----BEGIN PUBLIC KEY----- constant REKOR_PUB_KEY_ID (line 307) | pub(crate) const REKOR_PUB_KEY_ID: &str = constant FULCIO_CRT_1_PEM (line 310) | const FULCIO_CRT_1_PEM: &str = r#"-----BEGIN CERTIFICATE----- constant FULCIO_CRT_2_PEM (line 324) | const FULCIO_CRT_2_PEM: &str = r#"-----BEGIN CERTIFICATE----- constant SIGNED_IMAGE (line 339) | const SIGNED_IMAGE: &str = "busybox:1.34"; function get_fulcio_cert_pool (line 341) | pub(crate) fn get_fulcio_cert_pool() -> CertificatePool { function get_rekor_public_key (line 352) | pub(crate) fn get_rekor_public_key() -> (String, CosignVerificationKey) { function verify_constraints_all_satisfied (line 360) | fn verify_constraints_all_satisfied() { function verify_constraints_none_satisfied (line 415) | fn verify_constraints_none_satisfied() { function verify_constraints_some_unsatisfied (line 463) | fn verify_constraints_some_unsatisfied() { function add_constrains_all_succeed (line 511) | fn add_constrains_all_succeed() { function add_constrain_some_failed (line 531) | fn add_constrain_some_failed() { function sign_verify_image (line 573) | async fn sign_verify_image(#[case] signing_scheme: SigningScheme) { function prepare_image_to_be_signed (line 654) | async fn prepare_image_to_be_signed(client: &mut Client, image_ref: &Oci... function registry_image (line 679) | fn registry_image() -> testcontainers::GenericImage { FILE: src/cosign/payload/simple_signing.rs constant CRITICAL_TYPE_NAME (line 28) | pub const CRITICAL_TYPE_NAME: &str = "cosign container image signature"; type SimpleSigning (line 31) | pub struct SimpleSigning { method fmt (line 37) | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { method new (line 52) | pub fn new(image_ref: &OciReference, manifest_digest: &str) -> Self { method satisfies_annotations (line 68) | pub fn satisfies_annotations(&self, annotations: &BTreeMap bool { type Critical (line 103) | pub struct Critical { type Image (line 113) | pub struct Image { type Identity (line 119) | pub struct Identity { type Optional (line 124) | pub struct Optional { method satisfies_annotations (line 136) | pub fn satisfies_annotations(&self, annotations: &BTreeMap) -> fmt::Result { method from_certificate (line 426) | pub(crate) fn from_certificate( type CertificateSubject (line 94) | pub enum CertificateSubject { method from_certificate (line 523) | pub fn from_certificate(certificate: &Certificate) -> Result) -> fmt::Result { method new_unsigned (line 210) | pub fn new_unsigned(image_ref: &OciReference, manifest_digest: &str) -... method new (line 241) | pub(crate) fn new( method get_signature_from_annotations (line 293) | fn get_signature_from_annotations(annotations: &BTreeMap Bundle { function build_correct_signature_layer_with_certificate (line 605) | pub(crate) fn build_correct_signature_layer_with_certificate() -> Signat... function is_signed_by_key_fails_when_signature_is_not_valid (line 658) | fn is_signed_by_key_fails_when_signature_is_not_valid() { function new_signature_layer_fails_because_bad_descriptor (line 675) | fn new_signature_layer_fails_because_bad_descriptor() { function new_signature_layer_fails_because_bad_layer (line 705) | fn new_signature_layer_fails_because_bad_layer() { function new_signature_layer_fails_because_checksum_mismatch (line 735) | fn new_signature_layer_fails_because_checksum_mismatch() { function get_signature_from_annotations_success (line 766) | fn get_signature_from_annotations_success() { function get_signature_from_annotations_failure (line 775) | fn get_signature_from_annotations_failure() { function get_bundle_from_annotations_works (line 783) | fn get_bundle_from_annotations_works() { function get_certificate_signature_from_annotations_returns_none (line 801) | fn get_certificate_signature_from_annotations_returns_none() { function get_certificate_signature_from_annotations_fails_when_no_bundle_is_given (line 815) | fn get_certificate_signature_from_annotations_fails_when_no_bundle_is_gi... function get_certificate_signature_from_annotations_fails_when_no_fulcio_pub_key_is_given (line 832) | fn get_certificate_signature_from_annotations_fails_when_no_fulcio_pub_k... function is_signed_by_key (line 849) | fn is_signed_by_key() { type Error (line 877) | type Error = anyhow::Error; function try_from (line 879) | fn try_from(value: X509) -> std::result::Result { function certificate_signature_from_certificate_using_email (line 887) | fn certificate_signature_from_certificate_using_email() -> anyhow::Resul... function certificate_signature_from_certificate_using_uri (line 939) | fn certificate_signature_from_certificate_using_uri() -> anyhow::Result<... function certificate_signature_from_certificate_without_email_and_uri (line 992) | fn certificate_signature_from_certificate_without_email_and_uri() -> any... FILE: src/cosign/verification_constraint/annotation_verifier.rs type AnnotationVerifier (line 18) | pub struct AnnotationVerifier { method verify (line 23) | fn verify(&self, signature_layer: &SignatureLayer) -> Result { FILE: src/cosign/verification_constraint/cert_subject_email_verifier.rs type CertSubjectEmailVerifier (line 114) | pub struct CertSubjectEmailVerifier { method fmt (line 120) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { type StringVerifier (line 133) | pub enum StringVerifier { method verify (line 139) | fn verify(&self, s: &str) -> bool { method fmt (line 148) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { method verify (line 157) | fn verify(&self, signature_layer: &SignatureLayer) -> Result { function cert_email_verifier_only_email (line 196) | fn cert_email_verifier_only_email() { function cert_email_verifier_email_and_issuer (line 219) | fn cert_email_verifier_email_and_issuer() { function cert_email_verifier_no_signature (line 265) | fn cert_email_verifier_no_signature() { function cert_email_verifier_only_email_regex (line 276) | fn cert_email_verifier_only_email_regex() { function cert_email_verifier_email_and_issuer_regex (line 306) | fn cert_email_verifier_email_and_issuer_regex() { FILE: src/cosign/verification_constraint/cert_subject_url_verifier.rs type CertSubjectUrlVerifier (line 47) | pub struct CertSubjectUrlVerifier { method verify (line 53) | fn verify(&self, signature_layer: &SignatureLayer) -> Result { function cert_subject_url_verifier (line 84) | fn cert_subject_url_verifier() { function cert_subject_verifier_no_signature (line 122) | fn cert_subject_verifier_no_signature() { FILE: src/cosign/verification_constraint/certificate_verifier.rs type CertificateVerifier (line 14) | pub struct CertificateVerifier { method from_pem (line 32) | pub fn from_pem( method from_der (line 52) | pub fn from_der( method verify (line 84) | fn verify(&self, signature_layer: &SignatureLayer) -> Result { function verify_certificate_ (line 146) | fn verify_certificate_() -> anyhow::Result<()> { function test_data (line 180) | fn test_data() -> (SignatureLayer, String) { function build_bundle (line 231) | fn build_bundle() -> Bundle { function verify_correct_layer (line 246) | fn verify_correct_layer() { function rekor_integration (line 255) | fn rekor_integration() { function detect_signature_created_at_invalid_time (line 283) | fn detect_signature_created_at_invalid_time() { FILE: src/cosign/verification_constraint/mod.rs type VerificationConstraintVec (line 35) | pub type VerificationConstraintVec = Vec>; type VerificationConstraintRefVec (line 38) | pub type VerificationConstraintRefVec<'a> = Vec<&'a Box Result; FILE: src/cosign/verification_constraint/public_key_verifier.rs type PublicKeyVerifier (line 8) | pub struct PublicKeyVerifier { method new (line 16) | pub fn new(key_raw: &[u8], signing_scheme: &SigningScheme) -> Result Result { method verify (line 36) | fn verify(&self, signature_layer: &SignatureLayer) -> Result { function pub_key_verifier (line 50) | fn pub_key_verifier() { FILE: src/crypto/certificate.rs function is_trusted (line 32) | pub(crate) fn is_trusted(certificate: &Certificate, integrated_time: i64... function verify_key_usages (line 41) | pub(crate) fn verify_key_usages(certificate: &Certificate) -> Result<()> { function verify_has_san (line 66) | pub(crate) fn verify_has_san(certificate: &Certificate) -> Result<()> { function verify_validity (line 79) | pub(crate) fn verify_validity(certificate: &Certificate) -> Result<()> { function verify_expiration (line 94) | fn verify_expiration(certificate: &Certificate, integrated_time: i64) ->... type ExtensionErrorKind (line 126) | pub enum ExtensionErrorKind { type NotLeafErrorKind (line 138) | pub enum NotLeafErrorKind { type NotCAErrorKind (line 144) | pub enum NotCAErrorKind { type CertificateValidationError (line 157) | pub enum CertificateValidationError { function is_leaf (line 178) | pub(crate) fn is_leaf( function is_ca (line 235) | pub(crate) fn is_ca( function is_root_ca (line 292) | pub(crate) fn is_root_ca( function verify_cert_key_usages_success (line 326) | fn verify_cert_key_usages_success() -> anyhow::Result<()> { function verify_cert_key_usages_failure_because_no_digital_signature (line 339) | fn verify_cert_key_usages_failure_because_no_digital_signature() -> anyh... function verify_cert_key_usages_failure_because_no_code_signing (line 364) | fn verify_cert_key_usages_failure_because_no_code_signing() -> anyhow::R... function verify_cert_failure_because_no_san (line 386) | fn verify_cert_failure_because_no_san() -> anyhow::Result<()> { function verify_cert_validity_success (line 412) | fn verify_cert_validity_success() -> anyhow::Result<()> { function verify_cert_validity_failure (line 426) | fn verify_cert_validity_failure() -> anyhow::Result<()> { function verify_cert_expiration_success (line 453) | fn verify_cert_expiration_success() -> anyhow::Result<()> { function verify_cert_expiration_failure (line 480) | fn verify_cert_expiration_failure() -> anyhow::Result<()> { FILE: src/crypto/certificate_pool.rs type CertificatePool (line 24) | pub(crate) struct CertificatePool { method from_certificates (line 31) | pub(crate) fn from_certificates<'r, 'i, R, I>( method verify_pem_cert (line 59) | pub(crate) fn verify_pem_cert( method verify_der_cert (line 82) | pub(crate) fn verify_der_cert( method verify_cert_with_time (line 99) | pub(crate) fn verify_cert_with_time<'a, 'cert>( FILE: src/crypto/keyring.rs type KeyringError (line 28) | pub enum KeyringError { type Result (line 39) | type Result = std::result::Result; type Key (line 42) | struct Key { method new (line 51) | pub fn new(spki_bytes: &[u8]) -> Result { type Keyring (line 85) | pub struct Keyring(HashMap<[u8; 32], Key>); method new (line 89) | pub fn new<'a>(keys: impl IntoIterator) -> Result: Rfc6269HasherTrait method verify_match (line 31) | fn verify_match(a: &O, b: &O) -> Result<(), ()> { method verify_inclusion (line 44) | fn verify_inclusion( method root_from_inclusion_proof (line 67) | fn root_from_inclusion_proof( method verify_consistency (line 100) | fn verify_consistency( method chain_inner (line 202) | fn chain_inner(seed: &O, proof_hashes: &[O], index: u64) -> O { method chain_inner_right (line 221) | fn chain_inner_right(seed: &O, proof_hashes: &[O], index: u64) -> O { method chain_border_right (line 239) | fn chain_border_right(seed: &O, proof_hashes: &[O]) -> O { method decomp_inclusion_proof (line 251) | fn decomp_inclusion_proof(index: u64, tree_size: u64) -> (u64, u64) { method inner_proof_size (line 259) | fn inner_proof_size(index: u64, tree_size: u64) -> u64 { type InclusionProofTestVector (line 275) | struct InclusionProofTestVector<'a> { type ConsistencyTestVector (line 282) | struct ConsistencyTestVector<'a> { type InclusionProbe (line 290) | struct InclusionProbe { type ConsistencyProbe (line 301) | struct ConsistencyProbe<'a> { constant SHA256_SOME_HASH (line 310) | const SHA256_SOME_HASH: [u8; 32] = constant SHA256_EMPTY_TREE_HASH (line 313) | const SHA256_EMPTY_TREE_HASH: [u8; 32] = constant ZERO_HASH (line 316) | const ZERO_HASH: [u8; 32] = [0; 32]; constant INCLUSION_PROOFS (line 318) | const INCLUSION_PROOFS: [InclusionProofTestVector; 6] = [ constant CONSISTENCY_PROOFS (line 365) | const CONSISTENCY_PROOFS: [ConsistencyTestVector; 5] = [ constant ROOTS (line 408) | const ROOTS: [[u8; 32]; 8] = [ constant LEAVES (line 419) | const LEAVES: &[&[u8]] = &[ function corrupt_inclusion_proof (line 430) | fn corrupt_inclusion_proof( function verifier_check (line 540) | fn verifier_check( function verifier_consistency_check (line 587) | fn verifier_consistency_check( function corrupt_consistency_proof (line 620) | fn corrupt_consistency_proof<'a>( function test_verify_inclusion_single_entry (line 792) | fn test_verify_inclusion_single_entry() { function test_verify_inclusion (line 813) | fn test_verify_inclusion() { function test_verify_consistency (line 857) | fn test_verify_consistency() { FILE: src/crypto/merkle/rfc6962.rs type Rfc6269HashPrefix (line 7) | enum Rfc6269HashPrefix { type Rfc6269HasherTrait (line 13) | pub(crate) trait Rfc6269HasherTrait { method empty_root (line 15) | fn empty_root() -> O; method hash_leaf (line 17) | fn hash_leaf(leaf: impl AsRef<[u8]>) -> O; method hash_children (line 19) | fn hash_children(left: impl AsRef<[u8]>, right: impl AsRef<[u8]>) -> O; method empty_root (line 26) | fn empty_root() -> Output { method hash_leaf (line 29) | fn hash_leaf(leaf: impl AsRef<[u8]>) -> Output { method hash_children (line 35) | fn hash_children(left: impl AsRef<[u8]>, right: impl AsRef<[u8]>) -> Out... type Rfc6269Default (line 45) | pub(crate) type Rfc6269Default = Sha256; type TestCase (line 55) | struct TestCase { function test_hasher (line 62) | fn test_hasher() { function test_collisions (line 94) | fn test_collisions() { FILE: src/crypto/mod.rs type SigningScheme (line 51) | pub enum SigningScheme { method fmt (line 64) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { type Error (line 80) | type Error = String; method try_from (line 82) | fn try_from(value: &str) -> std::result::Result { method create_signer (line 100) | pub fn create_signer(&self) -> Result { method default (line 162) | fn default() -> Self { type Signature (line 168) | pub enum Signature<'a> { constant PUBLIC_KEY (line 213) | pub(crate) const PUBLIC_KEY: &str = r#"-----BEGIN PUBLIC KEY----- type CertData (line 218) | pub(crate) struct CertData { type CertGenerationOptions (line 223) | pub(crate) struct CertGenerationOptions { method default (line 239) | fn default() -> Self { function generate_ecdsa_p256_keypair (line 267) | pub(crate) fn generate_ecdsa_p256_keypair() function generate_ecdsa_p384_keypair (line 281) | pub(crate) fn generate_ecdsa_p384_keypair() function generate_ed25519_keypair (line 295) | pub(crate) fn generate_ed25519_keypair() -> (pkey::PKey, ... function generate_rsa_keypair (line 307) | pub(crate) fn generate_rsa_keypair( function generate_dsa_keypair (line 325) | pub(crate) fn generate_dsa_keypair( function generate_certificate (line 343) | pub(crate) fn generate_certificate( FILE: src/crypto/signing_key/ecdsa/ec.rs type EcdsaKeys (line 115) | pub struct EcdsaKeys function new (line 134) | pub fn new() -> Result { function from_encrypted_pem (line 147) | pub fn from_encrypted_pem(private_key: &[u8], password: &[u8]) -> Result... function from_pem (line 172) | pub fn from_pem(pem_data: &[u8]) -> Result { function from_der (line 193) | pub fn from_der(private_key: &[u8]) -> Result { function from_private_key (line 203) | fn from_private_key(ec_seckey: SecretKey) -> Result { function to_wrapped_ecdsa_keys (line 212) | pub fn to_wrapped_ecdsa_keys(&self) -> Result { method public_key_to_pem (line 225) | fn public_key_to_pem(&self) -> Result { method private_key_to_pem (line 232) | fn private_key_to_pem(&self) -> Result> { method public_key_to_der (line 239) | fn public_key_to_der(&self) -> Result> { method private_key_to_der (line 248) | fn private_key_to_der(&self) -> Result>> { method private_key_to_encrypted_pem (line 257) | fn private_key_to_encrypted_pem(&self, password: &[u8]) -> Result Result<... type EcdsaSigner (line 289) | pub struct EcdsaSigner function from_ecdsa_keys (line 314) | pub fn from_ecdsa_keys(ecdsa_keys: &EcdsaKeys) -> Result { function ecdsa_keys (line 332) | pub fn ecdsa_keys(&self) -> &EcdsaKeys { method sign (line 362) | fn sign(&self, msg: &[u8]) -> Result> { method key_pair (line 371) | fn key_pair(&self) -> &dyn KeyPair { constant PASSWORD (line 390) | const PASSWORD: &[u8] = b"123"; constant EMPTY_PASSWORD (line 391) | const EMPTY_PASSWORD: &[u8] = b""; function ecdsa_from_unencrypted_pem (line 396) | fn ecdsa_from_unencrypted_pem() { function ecdsa_from_encrypted_pem (line 415) | fn ecdsa_from_encrypted_pem(#[case] keypath: &str, #[case] password: &[u... function ecdsa_to_encrypted_pem (line 429) | fn ecdsa_to_encrypted_pem(#[case] password: &[u8]) { function ecdsa_error_unencrypted_pem_password (line 443) | fn ecdsa_error_unencrypted_pem_password() { function ecdsa_to_and_from_pem (line 458) | fn ecdsa_to_and_from_pem() { function ecdsa_to_and_from_encrypted_pem (line 474) | fn ecdsa_to_and_from_encrypted_pem(#[case] password: &[u8]) { function ecdsa_to_and_from_der (line 488) | fn ecdsa_to_and_from_der() { function ecdsa_generate_public_key (line 502) | fn ecdsa_generate_public_key() { function ecdsa_derive_verification_key (line 523) | fn ecdsa_derive_verification_key() { function ecdsa_sign_and_verify (line 538) | fn ecdsa_sign_and_verify() { FILE: src/crypto/signing_key/ecdsa/mod.rs type ECDSAKeys (line 84) | pub enum ECDSAKeys { method fmt (line 90) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { method new (line 121) | pub fn new(curve: EllipticCurve) -> Result { method as_inner (line 130) | pub fn as_inner(&self) -> &dyn KeyPair { method from_encrypted_pem (line 140) | pub fn from_encrypted_pem(private_key: &[u8], password: &[u8]) -> Resu... method from_pem (line 149) | pub fn from_pem(pem_data: &[u8]) -> Result { method from_der (line 154) | pub fn from_der(private_key: &[u8]) -> Result { method to_sigstore_signer (line 163) | pub fn to_sigstore_signer(&self) -> Result { type EllipticCurve (line 101) | pub enum EllipticCurve { FILE: src/crypto/signing_key/ed25519.rs type Ed25519Keys (line 79) | pub struct Ed25519Keys { method new (line 88) | pub fn new() -> Result { method from_ed25519key (line 99) | pub fn from_ed25519key(key: &Ed25519Keys) -> Result { method from_encrypted_pem (line 107) | pub fn from_encrypted_pem(encrypted_pem: &[u8], password: &[u8]) -> Re... method from_pem (line 137) | pub fn from_pem(pem: &[u8]) -> Result { method from_der (line 163) | pub fn from_der(der_bytes: &[u8]) -> Result { method from_key_pair_bytes (line 173) | fn from_key_pair_bytes(key_pair_bytes: KeypairBytes) -> Result { method to_sigstore_signer (line 189) | pub fn to_sigstore_signer(&self) -> Result { method public_key_to_pem (line 198) | fn public_key_to_pem(&self) -> Result { method public_key_to_der (line 205) | fn public_key_to_der(&self) -> Result> { method private_key_to_encrypted_pem (line 214) | fn private_key_to_encrypted_pem(&self, password: &[u8]) -> Result Result> { method private_key_to_der (line 234) | fn private_key_to_der(&self) -> Result>> { method to_verification_key (line 243) | fn to_verification_key( type Ed25519Signer (line 254) | pub struct Ed25519Signer { method from_ed25519_keys (line 259) | pub fn from_ed25519_keys(ed25519_keys: &Ed25519Keys) -> Result { method ed25519_keys (line 266) | pub fn ed25519_keys(&self) -> &Ed25519Keys { method key_pair (line 273) | fn key_pair(&self) -> &dyn KeyPair { method sign (line 278) | fn sign(&self, msg: &[u8]) -> Result> { constant PASSWORD (line 298) | const PASSWORD: &[u8] = b"123"; constant EMPTY_PASSWORD (line 299) | const EMPTY_PASSWORD: &[u8] = b""; function ed25519_from_unencrypted_pem (line 304) | fn ed25519_from_unencrypted_pem() { function ed25519_from_encrypted_pem (line 319) | fn ed25519_from_encrypted_pem(#[case] keypath: &str, #[case] password: &... function ed25519_to_encrypted_pem (line 333) | fn ed25519_to_encrypted_pem(#[case] password: &[u8]) { function ed25519_error_unencrypted_pem_password (line 346) | fn ed25519_error_unencrypted_pem_password() { function ed25519_to_and_from_pem (line 361) | fn ed25519_to_and_from_pem() { function ed25519_to_and_from_encrypted_pem (line 376) | fn ed25519_to_and_from_encrypted_pem(#[case] password: &[u8]) { function ed25519_to_and_from_der (line 389) | fn ed25519_to_and_from_der() { function ed25519_generate_public_key (line 402) | fn ed25519_generate_public_key() { function ecdsa_derive_verification_key (line 423) | fn ecdsa_derive_verification_key() { function ed25519_sign_and_verify (line 436) | fn ed25519_sign_and_verify() { FILE: src/crypto/signing_key/kdf.rs constant SALT_SIZE (line 30) | pub const SALT_SIZE: u32 = 32; constant NAME_SCRYPT (line 33) | pub const NAME_SCRYPT: &str = "scrypt"; constant SCRYPT_N_LOW (line 36) | pub const SCRYPT_N_LOW: u32 = 32768; constant SCRYPT_N_HIGH (line 38) | pub const SCRYPT_N_HIGH: u32 = 65536; constant SCRYPT_R (line 41) | pub const SCRYPT_R: u32 = 8; constant SCRYPT_P (line 44) | pub const SCRYPT_P: u32 = 1; constant NAME_SECRET_BOX (line 47) | pub const NAME_SECRET_BOX: &str = "nacl/secretbox"; constant BOX_KEY_SIZE (line 50) | pub const BOX_KEY_SIZE: usize = 32; constant BOX_NONCE_SIZE (line 53) | pub const BOX_NONCE_SIZE: u32 = 24; type ScryptParams (line 57) | pub struct ScryptParams { type ScryptKDF (line 67) | struct ScryptKDF { method key (line 111) | fn key(&self, password: &[u8]) -> Result> { method check_params (line 126) | fn check_params(&self) -> Result<()> { function to_base64 (line 75) | fn to_base64(v: &[u8], serializer: S) -> std::result::Result(deserializer: D) -> std::result::Result, ... method default (line 95) | fn default() -> Self { type SecretBoxCipher (line 141) | struct SecretBoxCipher { method encrypt (line 162) | fn encrypt(&mut self, plaintext: &[u8], key: &[u8]) -> Result> { method decrypt (line 182) | fn decrypt(&self, ciphertext: &[u8], key: &[u8]) -> Result> { method default (line 150) | fn default() -> Self { type Data (line 197) | struct Data { function generate_random (line 209) | fn generate_random(len: u32) -> Vec { function encrypt (line 220) | pub fn encrypt(plaintext: &[u8], password: &[u8]) -> Result> { function decrypt (line 240) | pub fn decrypt(ciphertext: &[u8], password: &[u8]) -> Result> { function serde_kdf (line 273) | fn serde_kdf() { FILE: src/crypto/signing_key/mod.rs constant COSIGN_PRIVATE_KEY_PEM_LABEL (line 89) | pub const COSIGN_PRIVATE_KEY_PEM_LABEL: &str = "ENCRYPTED COSIGN PRIVATE... constant PUBLIC_KEY_PEM_LABEL (line 92) | pub const PUBLIC_KEY_PEM_LABEL: &str = "PUBLIC KEY"; constant SIGSTORE_PRIVATE_KEY_PEM_LABEL (line 95) | pub const SIGSTORE_PRIVATE_KEY_PEM_LABEL: &str = "ENCRYPTED SIGSTORE PRI... constant PRIVATE_KEY_PEM_LABEL (line 98) | pub const PRIVATE_KEY_PEM_LABEL: &str = "PRIVATE KEY"; constant RSA_PRIVATE_KEY_PEM_LABEL (line 101) | pub const RSA_PRIVATE_KEY_PEM_LABEL: &str = "RSA PRIVATE KEY"; type KeyPair (line 109) | pub trait KeyPair { method public_key_to_pem (line 111) | fn public_key_to_pem(&self) -> Result; method public_key_to_der (line 114) | fn public_key_to_der(&self) -> Result>; method private_key_to_encrypted_pem (line 119) | fn private_key_to_encrypted_pem(&self, password: &[u8]) -> Result Result>; method private_key_to_der (line 125) | fn private_key_to_der(&self) -> Result>>; method to_verification_key (line 129) | fn to_verification_key( type SigStoreKeyPair (line 136) | pub enum SigStoreKeyPair { method fmt (line 143) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { method from_pem (line 180) | pub fn from_pem(pem_data: &[u8]) -> Result { method from_der (line 185) | pub fn from_der(private_key: &[u8]) -> Result { method from_encrypted_pem (line 190) | pub fn from_encrypted_pem(pem_data: &[u8], password: &[u8]) -> Result<... method public_key_to_pem (line 195) | pub fn public_key_to_pem(&self) -> Result { method public_key_to_der (line 200) | pub fn public_key_to_der(&self) -> Result> { method private_key_to_encrypted_pem (line 207) | pub fn private_key_to_encrypted_pem(&self, password: &[u8]) -> Result<... method private_key_to_pem (line 212) | pub fn private_key_to_pem(&self) -> Result> { method private_key_to_der (line 217) | pub fn private_key_to_der(&self) -> Result>> { method to_verification_key (line 223) | pub fn to_verification_key( method to_sigstore_signer (line 233) | pub fn to_sigstore_signer(&self, signing_scheme: &SigningScheme) -> Re... type Signer (line 302) | pub trait Signer { method key_pair (line 304) | fn key_pair(&self) -> &dyn KeyPair; method sign (line 307) | fn sign(&self, msg: &[u8]) -> Result>; type SigStoreSigner (line 312) | pub enum SigStoreSigner { method as_inner (line 327) | fn as_inner(&self) -> &dyn Signer { method sign (line 342) | pub fn sign(&self, msg: &[u8]) -> Result> { method to_verification_key (line 347) | pub fn to_verification_key(&self) -> Result { method to_sigstore_keypair (line 365) | pub fn to_sigstore_keypair(&self) -> Result { constant MESSAGE (line 399) | pub const MESSAGE: &str = r#"{ function sigstore_signing (line 423) | fn sigstore_signing(#[case] signing_scheme: SigningScheme) { FILE: src/crypto/signing_key/rsa/keypair.rs type RSAKeys (line 61) | pub struct RSAKeys { method new (line 70) | pub fn new(bit_size: usize) -> Result { method from_rsa_privatekey_key (line 81) | pub fn from_rsa_privatekey_key(key: &RSAKeys) -> Result { method from_encrypted_pem (line 89) | pub fn from_encrypted_pem(encrypted_pem: &[u8], password: &[u8]) -> Re... method from_pem (line 120) | pub fn from_pem(pem: &[u8]) -> Result { method from_der (line 150) | pub fn from_der(der_bytes: &[u8]) -> Result { method to_sigstore_signer (line 161) | pub fn to_sigstore_signer( method from (line 213) | fn from(private_key: RsaPrivateKey) -> Self { method public_key_to_pem (line 223) | fn public_key_to_pem(&self) -> Result { method public_key_to_der (line 230) | fn public_key_to_der(&self) -> Result> { method private_key_to_encrypted_pem (line 239) | fn private_key_to_encrypted_pem(&self, password: &[u8]) -> Result Result> { method private_key_to_der (line 257) | fn private_key_to_der(&self) -> Result>> { method to_verification_key (line 266) | fn to_verification_key(&self, signing_scheme: &SigningScheme) -> Result<... constant PASSWORD (line 291) | const PASSWORD: &[u8] = b"123"; constant EMPTY_PASSWORD (line 292) | const EMPTY_PASSWORD: &[u8] = b""; constant KEY_SIZE (line 293) | const KEY_SIZE: usize = 2048; function rsa_from_unencrypted_pem (line 298) | fn rsa_from_unencrypted_pem() { function rsa_from_encrypted_pem (line 313) | fn rsa_from_encrypted_pem(#[case] keypath: &str, #[case] password: &[u8]) { function rsa_to_encrypted_pem (line 329) | fn rsa_to_encrypted_pem(#[case] password: &[u8]) { function rsa_error_unencrypted_pem_password (line 342) | fn rsa_error_unencrypted_pem_password() { function rsa_to_and_from_pem (line 357) | fn rsa_to_and_from_pem() { function rsa_to_and_from_encrypted_pem (line 372) | fn rsa_to_and_from_encrypted_pem(#[case] password: &[u8]) { function rsa_to_and_from_der (line 385) | fn rsa_to_and_from_der() { function rsa_generate_public_key (line 398) | fn rsa_generate_public_key() { function rsa_derive_verification_key (line 419) | fn rsa_derive_verification_key() { function rsa_sign_and_verify (line 433) | fn rsa_sign_and_verify() { FILE: src/crypto/signing_key/rsa/mod.rs constant DEFAULT_KEY_SIZE (line 67) | pub const DEFAULT_KEY_SIZE: usize = 2048; type DigestAlgorithm (line 71) | pub enum DigestAlgorithm { type PaddingScheme (line 82) | pub enum PaddingScheme { type RSASigner (line 97) | pub enum RSASigner { method from_rsa_keys (line 121) | pub fn from_rsa_keys( method rsa_keys (line 160) | pub fn rsa_keys(&self) -> &RSAKeys { method to_verification_key (line 165) | pub fn to_verification_key(&self) -> Result { method sign (line 191) | fn sign(&self, msg: &[u8]) -> Result> { method key_pair (line 203) | fn key_pair(&self) -> &dyn KeyPair { function rsa_schemes (line 249) | fn rsa_schemes( FILE: src/crypto/transparency.rs function cert_is_preissuer (line 36) | fn cert_is_preissuer(cert: &Certificate) -> bool { function find_issuer_cert (line 46) | fn find_issuer_cert(chain: &[Certificate]) -> Option<&Certificate> { type CertificateErrorKind (line 58) | pub enum CertificateErrorKind { method from (line 79) | fn from(value: x509_cert::ext::pkix::Error) -> Self { type SCTError (line 88) | pub enum SCTError { type SignatureType (line 101) | enum SignatureType { type LogEntryType (line 108) | enum LogEntryType { type PreCert (line 114) | struct PreCert { type SignedEntry (line 123) | enum SignedEntry { type DigitallySigned (line 132) | pub struct DigitallySigned { method from (line 235) | fn from(value: &CertificateEmbeddedSCT) -> Self { method from (line 270) | fn from(value: &SigningCertificateDetachedSCT) -> Self { type CertificateEmbeddedSCT (line 150) | pub struct CertificateEmbeddedSCT<'a> { function new_with_spki (line 157) | fn new_with_spki(cert: &'a Certificate, spki: &[u8]) -> Result Result(sct: S, keyring: &Keyring) -> Result<(), SCTError> function verify_embedded_sct (line 320) | fn verify_embedded_sct() { function verify_detached_sct (line 384) | fn verify_detached_sct() { FILE: src/crypto/verification_key.rs type CosignVerificationKey (line 49) | pub enum CosignVerificationKey { type Error (line 69) | type Error = SigstoreError; method try_from (line 71) | fn try_from(subject_pub_key_info: &SubjectPublicKeyInfoOwned) -> Resul... method from_der (line 126) | pub fn from_der(der_data: &[u8], signing_scheme: &SigningScheme) -> Re... method try_from_der (line 208) | pub fn try_from_der(der_data: &[u8]) -> Result { method from_pem (line 232) | pub fn from_pem(pem_data: &[u8], signing_scheme: &SigningScheme) -> Re... method try_from_pem (line 243) | pub fn try_from_pem(pem_data: &[u8]) -> Result { method from_sigstore_signer (line 250) | pub fn from_sigstore_signer(signer: &SigStoreSigner) -> Result { method from_key_pair (line 256) | pub fn from_key_pair(signer: &dyn KeyPair, signing_scheme: &SigningSch... method verify_signature (line 262) | pub fn verify_signature(&self, signature: Signature, msg: &[u8]) -> Re... method verify_prehash (line 334) | pub(crate) fn verify_prehash(&self, signature: Signature, msg: &[u8]) ... function verify_signature_success (line 406) | fn verify_signature_success() { function verify_signature_failure_because_wrong_msg (line 418) | fn verify_signature_failure_because_wrong_msg() { function verify_signature_failure_because_wrong_signature (line 433) | fn verify_signature_failure_because_wrong_signature() { function verify_signature_failure_because_wrong_verification_key (line 448) | fn verify_signature_failure_because_wrong_verification_key() { function verify_rsa_signature (line 470) | fn verify_rsa_signature() { function convert_ecdsa_p256_subject_public_key_to_cosign_verification_key (line 497) | fn convert_ecdsa_p256_subject_public_key_to_cosign_verification_key() ->... function convert_ecdsa_p384_subject_public_key_to_cosign_verification_key (line 524) | fn convert_ecdsa_p384_subject_public_key_to_cosign_verification_key() ->... function convert_rsa_subject_public_key_to_cosign_verification_key (line 551) | fn convert_rsa_subject_public_key_to_cosign_verification_key() -> anyhow... function convert_ed25519_subject_public_key_to_cosign_verification_key (line 578) | fn convert_ed25519_subject_public_key_to_cosign_verification_key() -> an... function convert_unsupported_curve_subject_public_key_to_cosign_verification_key (line 605) | fn convert_unsupported_curve_subject_public_key_to_cosign_verification_k... FILE: src/errors.rs type SigstoreVerifyConstraintsError (line 30) | pub struct SigstoreVerifyConstraintsError<'a> { type SigstoreApplicationConstraintsError (line 38) | pub struct SigstoreApplicationConstraintsError<'a> { type Result (line 42) | pub type Result = std::result::Result; type SigstoreError (line 45) | pub enum SigstoreError { FILE: src/fulcio/mod.rs constant FULCIO_ROOT (line 23) | pub const FULCIO_ROOT: &str = "https://fulcio.sigstore.dev/"; constant SIGNING_CERT_PATH (line 26) | pub const SIGNING_CERT_PATH: &str = "api/v1/signingCert"; constant SIGNING_CERT_V2_PATH (line 27) | pub const SIGNING_CERT_V2_PATH: &str = "api/v2/signingCert"; constant CONTENT_TYPE_HEADER_NAME (line 29) | const CONTENT_TYPE_HEADER_NAME: &str = "content-type"; type Csr (line 37) | struct Csr { type Error (line 43) | type Error = serde_json::Error; method try_from (line 45) | fn try_from(csr: Csr) -> std::result::Result { type PublicKey (line 52) | struct PublicKey(String, SigningScheme); method serialize (line 55) | fn serialize(&self, serializer: S) -> std::result::Result &[u8] { method fmt (line 90) | fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result { type TokenProvider (line 97) | pub enum TokenProvider { method get_token (line 129) | pub async fn get_token(&self) -> Result<(CoreIdToken, String)> { type FulcioClient (line 139) | pub struct FulcioClient { method new (line 151) | pub fn new(root_url: Url, token_provider: TokenProvider) -> Self { method request_cert (line 163) | pub async fn request_cert( method request_cert_v2 (line 210) | pub async fn request_cert_v2( FILE: src/fulcio/models.rs function serialize_x509_csr (line 31) | fn serialize_x509_csr( function deserialize_inner_detached_sct (line 45) | fn deserialize_inner_detached_sct<'de, D>(de: D) -> std::result::Result<... function deserialize_inner_detached_sct_signature (line 53) | fn deserialize_inner_detached_sct_signature<'de, D>(de: D) -> Result Self { method with_client_secret (line 39) | pub fn with_client_secret(self, client_secret: &str) -> Self { method with_issuer (line 49) | pub fn with_issuer(self, issuer: &str) -> Self { method with_redirect_port (line 59) | pub fn with_redirect_port(self, port: u32) -> Self { method redirect_url (line 68) | fn redirect_url(&self) -> String { method get_token (line 77) | pub async fn get_token(&self) -> Result<(CoreIdToken, String)> { FILE: src/mock_client.rs type MockOciClient (line 29) | pub struct MockOciClient { method fetch_manifest_digest (line 41) | async fn fetch_manifest_digest( method pull (line 63) | async fn pull( method pull_manifest (line 86) | async fn pull_manifest( method push (line 107) | async fn push( FILE: src/oauth/http_client.rs type AsyncReqwestClient (line 31) | pub(crate) struct AsyncReqwestClient(pub reqwest::Client); type Error (line 34) | type Error = HttpClientError; type Future (line 37) | type Future = Pin Self::Future { type SyncReqwestClient (line 73) | pub(crate) struct SyncReqwestClient(pub reqwest::blocking::Client); type Error (line 77) | type Error = HttpClientError; method call (line 79) | fn call(&self, request: HttpRequest) -> Result { FILE: src/oauth/openidflow.rs type OpenIdClient (line 106) | pub(crate) type OpenIdClient = openidconnect::core::CoreClient< type OpenIDAuthorize (line 116) | pub struct OpenIDAuthorize { method new (line 139) | pub fn new(client_id: &str, client_secret: &str, issuer: &str, redirec... method auth_url_internal (line 148) | fn auth_url_internal( method auth_url (line 176) | pub fn auth_url(&self) -> Result<(Url, OpenIdClient, Nonce, PkceCodeVe... method auth_url_async (line 195) | pub async fn auth_url_async(&self) -> Result<(Url, OpenIdClient, Nonce... type RedirectListener (line 216) | pub struct RedirectListener { method new (line 239) | pub fn new( method redirect_listener_internal (line 253) | fn redirect_listener_internal(&self) -> Result { method redirect_listener (line 305) | pub fn redirect_listener(self) -> Result<(CoreIdTokenClaims, CoreIdTok... method redirect_listener_async (line 329) | pub async fn redirect_listener_async(self) -> Result<(CoreIdTokenClaim... method extract_token_and_claims (line 354) | fn extract_token_and_claims( function assert_auth_url (line 378) | fn assert_auth_url(url: &str) { function test_auth_url (line 387) | fn test_auth_url() { function test_auth_url_async (line 400) | async fn test_auth_url_async() { FILE: src/oauth/token.rs type Claims (line 24) | pub struct Claims { type UnverifiedClaims (line 34) | pub type UnverifiedClaims = Claims; type IdentityToken (line 37) | pub struct IdentityToken { method unverified_claims (line 47) | pub fn unverified_claims(&self) -> &UnverifiedClaims { method in_validity_period (line 52) | pub fn in_validity_period(&self) -> bool { type Error (line 64) | type Error = SigstoreError; method try_from (line 66) | fn try_from(value: &str) -> Result { method from (line 93) | fn from(value: CoreIdToken) -> Self { method fmt (line 103) | fn fmt(&self, f: &mut std::fmt::Formatter<'_>) -> std::fmt::Result { FILE: src/registry/config.rs type Auth (line 26) | pub enum Auth { method from (line 48) | fn from(auth: &oci_client::secrets::RegistryAuth) -> Self { function from (line 36) | fn from(auth: &Auth) -> Self { type ClientProtocol (line 61) | pub enum ClientProtocol { function from (line 72) | fn from(cp: ClientProtocol) -> Self { type CertificateEncoding (line 85) | pub enum CertificateEncoding { function from (line 93) | fn from(ce: CertificateEncoding) -> Self { type Certificate (line 103) | pub struct Certificate { method cmp (line 112) | fn cmp(&self, other: &Self) -> Ordering { method partial_cmp (line 118) | fn partial_cmp(&self, other: &Self) -> Option { function from (line 124) | fn from(cert: &Certificate) -> Self { type Error (line 133) | type Error = errors::SigstoreError; function try_from (line 134) | fn try_from(value: Certificate) -> errors::Result> { type ClientConfig (line 149) | pub struct ClientConfig { method default (line 182) | fn default() -> Self { function from (line 197) | fn from(config: ClientConfig) -> Self { type PushResponse (line 218) | pub struct PushResponse { method from (line 235) | fn from(pr: oci_client::client::PushResponse) -> Self { function from (line 226) | fn from(pr: PushResponse) -> Self { FILE: src/registry/mod.rs type ClientCapabilitiesDeps (line 48) | pub(crate) trait ClientCapabilitiesDeps: Send + Sync {} type ClientCapabilitiesDeps (line 58) | pub(crate) trait ClientCapabilitiesDeps {} type ClientCapabilities (line 63) | pub(crate) trait ClientCapabilities: ClientCapabilitiesDeps { method fetch_manifest_digest (line 64) | async fn fetch_manifest_digest( method pull (line 70) | async fn pull( method pull_manifest (line 77) | async fn pull_manifest( method push (line 83) | async fn push( FILE: src/registry/oci_caching_client.rs type OciCachingClient (line 31) | pub(crate) struct OciCachingClient { function fetch_manifest_digest_cached (line 43) | async fn fetch_manifest_digest_cached( type PullSettings (line 61) | struct PullSettings<'a> { function new (line 68) | fn new( function image (line 84) | pub fn image(&self) -> oci_client::Reference { function auth (line 90) | pub fn auth(&self) -> oci_client::secrets::RegistryAuth { function hash (line 104) | pub fn hash(&self) -> String { function pull_cached (line 136) | async fn pull_cached( type PullManifestSettings (line 156) | struct PullManifestSettings { method new (line 162) | fn new( method image (line 176) | pub fn image(&self) -> oci_client::Reference { method auth (line 182) | pub fn auth(&self) -> oci_client::secrets::RegistryAuth { method hash (line 196) | pub fn hash(&self) -> String { function pull_manifest_cached (line 228) | async fn pull_manifest_cached( method fetch_manifest_digest (line 249) | async fn fetch_manifest_digest( method pull (line 266) | async fn pull( method pull_manifest (line 286) | async fn pull_manifest( method push (line 305) | async fn push( FILE: src/registry/oci_client.rs type OciClient (line 26) | pub(crate) struct OciClient { method fetch_manifest_digest (line 35) | async fn fetch_manifest_digest( method pull (line 49) | async fn pull( method pull_manifest (line 64) | async fn pull_manifest( method push (line 78) | async fn push( FILE: src/registry/oci_reference.rs type OciReference (line 22) | pub struct OciReference { method with_tag (line 40) | pub fn with_tag(registry: String, repository: String, tag: String) -> ... method with_digest (line 47) | pub fn with_digest(registry: String, repository: String, digest: Strin... method resolve_registry (line 57) | pub fn resolve_registry(&self) -> &str { method registry (line 62) | pub fn registry(&self) -> &str { method repository (line 67) | pub fn repository(&self) -> &str { method digest (line 72) | pub fn digest(&self) -> Option<&str> { method tag (line 77) | pub fn tag(&self) -> Option<&str> { method whole (line 82) | pub fn whole(&self) -> String { type Err (line 27) | type Err = SigstoreError; method from_str (line 29) | fn from_str(s: &str) -> Result { method fmt (line 88) | fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result { FILE: src/rekor/apis/configuration.rs constant VERSION (line 11) | const VERSION: Option<&str> = option_env!("CARGO_PKG_VERSION"); type Configuration (line 14) | pub struct Configuration { method new (line 34) | pub fn new() -> Configuration { type BasicAuth (line 25) | pub type BasicAuth = (String, Option); type ApiKey (line 28) | pub struct ApiKey { method default (line 40) | fn default() -> Self { FILE: src/rekor/apis/entries_api.rs type CreateLogEntryError (line 20) | pub enum CreateLogEntryError { type GetLogEntryByIndexError (line 30) | pub enum GetLogEntryByIndexError { type GetLogEntryByUuidError (line 39) | pub enum GetLogEntryByUuidError { type SearchLogQueryError (line 48) | pub enum SearchLogQueryError { type LogEntries (line 56) | pub struct LogEntries { function parse_response (line 63) | pub fn parse_response(local_var_content: String) -> String { function create_log_entry (line 72) | pub async fn create_log_entry( function get_log_entry_by_index (line 114) | pub async fn get_log_entry_by_index( function get_log_entry_by_uuid (line 157) | pub async fn get_log_entry_by_uuid( function search_log_query (line 197) | pub async fn search_log_query( FILE: src/rekor/apis/index_api.rs type SearchIndexError (line 18) | pub enum SearchIndexError { function search_index (line 24) | pub async fn search_index( FILE: src/rekor/apis/mod.rs type ResponseContent (line 4) | pub struct ResponseContent { type Error (line 11) | pub enum Error { function error_status (line 35) | fn error_status(response: &ResponseContent) -> reqwest::StatusCode { function urlencode (line 39) | pub fn urlencode>(s: T) -> String { FILE: src/rekor/apis/pubkey_api.rs type GetPublicKeyError (line 18) | pub enum GetPublicKeyError { function get_public_key (line 24) | pub async fn get_public_key( FILE: src/rekor/apis/tlog_api.rs type GetLogInfoError (line 18) | pub enum GetLogInfoError { type GetLogProofError (line 27) | pub enum GetLogProofError { function get_log_info (line 41) | pub async fn get_log_info( function get_log_proof (line 99) | pub async fn get_log_proof( FILE: src/rekor/mod.rs type TreeSize (line 91) | type TreeSize = u64; FILE: src/rekor/models/alpine.rs type Alpine (line 15) | pub struct Alpine { method new (line 26) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/alpine_all_of.rs type AlpineAllOf (line 14) | pub struct AlpineAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> AlpineAllOf { FILE: src/rekor/models/checkpoint.rs type SignedCheckpoint (line 18) | pub struct SignedCheckpoint { method decode (line 73) | pub(crate) fn decode(s: &str) -> Result { method encode (line 95) | pub(crate) fn encode(&self) -> String { method verify_signature (line 109) | pub fn verify_signature(&self, rekor_key: &CosignVerificationKey) -> R... method is_valid_for_proof (line 126) | pub(crate) fn is_valid_for_proof( method deserialize (line 221) | fn deserialize(deserializer: D) -> Result type Checkpoint (line 25) | pub struct Checkpoint { method marshal (line 150) | fn marshal(&self) -> String { method unmarshal (line 164) | fn unmarshal(s: &str) -> Result { type CheckpointSignature (line 41) | pub struct CheckpointSignature { method encode (line 235) | fn encode(&self) -> String { method decode (line 245) | fn decode(s: &str) -> Result { type OtherContent (line 51) | pub enum OtherContent { method fmt (line 57) | fn fmt(&self, f: &mut Formatter<'_>) -> std::fmt::Result { type ParseCheckpointError (line 66) | pub enum ParseCheckpointError { method serialize (line 212) | fn serialize(&self, serializer: S) -> Result function test_marshal (line 281) | fn test_marshal() { function test_unmarshal_valid (line 321) | fn test_unmarshal_valid() { function test_unmarshal_invalid (line 382) | fn test_unmarshal_invalid() { function test_to_string_valid_with_url_name (line 428) | fn test_to_string_valid_with_url_name() { function test_to_string_valid_with_id_name (line 440) | fn test_to_string_valid_with_id_name() { function test_from_str_valid_with_url_name (line 452) | fn test_from_str_valid_with_url_name() { function test_from_str_valid_with_id_name (line 464) | fn test_from_str_valid_with_id_name() { function test_from_str_valid_with_whitespace (line 476) | fn test_from_str_valid_with_whitespace() { function test_from_str_invalid_with_spaces_in_name (line 488) | fn test_from_str_invalid_with_spaces_in_name() { function test_checkpoint_encode_decode_multiple_signatures (line 495) | fn test_checkpoint_encode_decode_multiple_signatures() { FILE: src/rekor/models/consistency_proof.rs type RekorConsistencyProof (line 21) | pub struct RekorConsistencyProof { type ConsistencyProof (line 40) | pub struct ConsistencyProof { type Error (line 49) | type Error = crate::errors::SigstoreError; method try_from (line 51) | fn try_from(raw: RekorConsistencyProof) -> Result { method new (line 65) | pub fn new(root_hash: [u8; 32], hashes: Vec<[u8; 32]>) -> ConsistencyP... method verify (line 72) | pub fn verify( FILE: src/rekor/models/error.rs type Error (line 14) | pub struct Error { method new (line 22) | pub fn new() -> Error { FILE: src/rekor/models/hashedrekord.rs type Hashedrekord (line 19) | pub struct Hashedrekord { method new (line 30) | pub fn new(kind: String, api_version: String, spec: Spec) -> Hashedrek... type Spec (line 42) | pub struct Spec { method new (line 49) | pub fn new(signature: Signature, data: Data) -> Spec { type Signature (line 57) | pub struct Signature { method new (line 63) | pub fn new(content: String, public_key: PublicKey) -> Signature { type PublicKey (line 74) | pub struct PublicKey { method new (line 79) | pub fn new(content: String) -> PublicKey { method decode (line 83) | pub fn decode(&self) -> Result { type Data (line 91) | pub struct Data { method new (line 96) | pub fn new(hash: Hash) -> Data { type AlgorithmKind (line 103) | pub enum AlgorithmKind { type Hash (line 112) | pub struct Hash { method new (line 118) | pub fn new(algorithm: AlgorithmKind, value: String) -> Hash { FILE: src/rekor/models/hashedrekord_all_of.rs type HashedrekordAllOf (line 14) | pub struct HashedrekordAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> Hashedreko... FILE: src/rekor/models/helm.rs type Helm (line 16) | pub struct Helm { method new (line 27) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/helm_all_of.rs type HelmAllOf (line 14) | pub struct HelmAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> HelmAllOf { FILE: src/rekor/models/inactive_shard_log_info.rs type InactiveShardLogInfo (line 15) | pub struct InactiveShardLogInfo { method new (line 31) | pub fn new( FILE: src/rekor/models/inclusion_proof.rs type InclusionProof (line 24) | pub struct InclusionProof { method new (line 45) | pub fn new( method verify (line 63) | pub fn verify( FILE: src/rekor/models/intoto.rs type Intoto (line 16) | pub struct Intoto { method new (line 27) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/intoto_all_of.rs type IntotoAllOf (line 14) | pub struct IntotoAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> IntotoAllOf { FILE: src/rekor/models/jar.rs type Jar (line 15) | pub struct Jar { method new (line 26) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/jar_all_of.rs type JarAllOf (line 14) | pub struct JarAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> JarAllOf { FILE: src/rekor/models/log_entry.rs type LogEntry (line 39) | pub struct LogEntry { method verify_inclusion (line 144) | pub fn verify_inclusion(&self, rekor_key: &CosignVerificationKey) -> R... type Err (line 52) | type Err = Error; method from_str (line 53) | fn from_str(s: &str) -> Result { type Body (line 71) | pub enum Body { method default (line 84) | fn default() -> Self { function decode_body (line 89) | fn decode_body(s: &str) -> Result { type Attestation (line 96) | pub struct Attestation { type Verification (line 106) | pub struct Verification { type RekorInclusionProof (line 167) | pub struct RekorInclusionProof { type Error (line 181) | type Error = crate::errors::SigstoreError; method try_from (line 183) | fn try_from(api: &RekorInclusionProof) -> Result { constant LOG_ENTRY (line 220) | const LOG_ENTRY: &str = r#" constant REKOR_STAGING_KEY_PEM (line 254) | const REKOR_STAGING_KEY_PEM: &str = r#" function test_inclusion_proof_valid (line 262) | fn test_inclusion_proof_valid() { function test_inclusion_proof_missing_proof (line 275) | fn test_inclusion_proof_missing_proof() { function test_inclusion_proof_modified_proof (line 289) | fn test_inclusion_proof_modified_proof() { FILE: src/rekor/models/log_info.rs type RekorLogInfo (line 22) | pub struct RekorLogInfo { type LogInfo (line 47) | pub struct LogInfo { type Error (line 61) | type Error = crate::errors::SigstoreError; method try_from (line 62) | fn try_from(raw: RekorLogInfo) -> Result { method new (line 74) | pub fn new( method verify_consistency (line 133) | pub fn verify_consistency( constant LOG_INFO_OLD (line 163) | const LOG_INFO_OLD: &str = r#" constant LOG_INFO_NEW (line 191) | const LOG_INFO_NEW: &str = r#" constant LOG_PROOF (line 219) | const LOG_PROOF: &str = r#" constant REKOR_STAGING_KEY_PEM (line 236) | const REKOR_STAGING_KEY_PEM: &str = r#" function test_consistency_valid (line 244) | fn test_consistency_valid() { function test_consistency_invalid (line 274) | fn test_consistency_invalid() { FILE: src/rekor/models/proposed_entry.rs type ProposedEntry (line 14) | pub enum ProposedEntry { FILE: src/rekor/models/rekord.rs type Rekord (line 15) | pub struct Rekord { method new (line 26) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/rekord_all_of.rs type RekordAllOf (line 14) | pub struct RekordAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> RekordAllOf { FILE: src/rekor/models/rfc3161.rs type Rfc3161 (line 15) | pub struct Rfc3161 { method new (line 26) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/rfc3161_all_of.rs type Rfc3161AllOf (line 14) | pub struct Rfc3161AllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> Rfc3161All... FILE: src/rekor/models/rpm.rs type Rpm (line 16) | pub struct Rpm { method new (line 27) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/rpm_all_of.rs type RpmAllOf (line 13) | pub struct RpmAllOf { method new (line 21) | pub fn new(api_version: String, spec: serde_json::Value) -> RpmAllOf { FILE: src/rekor/models/search_index.rs type SearchIndex (line 14) | pub struct SearchIndex { method new (line 24) | pub fn new() -> SearchIndex { FILE: src/rekor/models/search_index_public_key.rs type SearchIndexPublicKey (line 14) | pub struct SearchIndexPublicKey { method new (line 24) | pub fn new(format: Format) -> SearchIndexPublicKey { type Format (line 37) | pub enum Format { FILE: src/rekor/models/search_log_query.rs type SearchLogQuery (line 14) | pub struct SearchLogQuery { method new (line 24) | pub fn new() -> SearchLogQuery { FILE: src/rekor/models/tuf.rs type Tuf (line 16) | pub struct Tuf { method new (line 27) | pub fn new(kind: String, api_version: String, spec: serde_json::Value)... FILE: src/rekor/models/tuf_all_of.rs type TufAllOf (line 14) | pub struct TufAllOf { method new (line 22) | pub fn new(api_version: String, spec: serde_json::Value) -> TufAllOf { FILE: src/trust/mod.rs type TrustRoot (line 25) | pub trait TrustRoot { method fulcio_certs (line 26) | fn fulcio_certs(&self) -> crate::errors::Result>>; method rekor_keys (line 27) | fn rekor_keys(&self) -> crate::errors::Result>; method ctfe_keys (line 28) | fn ctfe_keys(&self) -> crate::errors::Result>; method fulcio_certs (line 41) | fn fulcio_certs(&self) -> crate::errors::Result... method rekor_keys (line 45) | fn rekor_keys(&self) -> crate::errors::Result> { method ctfe_keys (line 53) | fn ctfe_keys(&self) -> crate::errors::Result> { type ManualTrustRoot (line 34) | pub struct ManualTrustRoot<'a> { FILE: src/trust/sigstore/constants.rs constant SIGSTORE_METADATA_BASE (line 16) | pub(crate) const SIGSTORE_METADATA_BASE: &str = "https://tuf-repo-cdn.si... constant SIGSTORE_TARGET_BASE (line 17) | pub(crate) const SIGSTORE_TARGET_BASE: &str = "https://tuf-repo-cdn.sigs... FILE: src/trust/sigstore/mod.rs type SigstoreTrustRoot (line 50) | pub struct SigstoreTrustRoot { method from_tough (line 56) | async fn from_tough( method new (line 69) | pub async fn new(cache_dir: Option<&Path>) -> Result { method from_trusted_root_json_unchecked (line 99) | pub fn from_trusted_root_json_unchecked(data: &[u8]) -> Result { method from_client_trust_config (line 118) | pub fn from_client_trust_config(pki_file: &PathBuf) -> Result { method fetch_target (line 134) | async fn fetch_target( method tlog_keys (line 197) | fn tlog_keys(tlogs: &[TransparencyLogInstance]) -> impl Iterator Result { method fulcio_certs (line 256) | fn fulcio_certs(&self) -> Result>> { method rekor_keys (line 277) | fn rekor_keys(&self) -> Result> { method ctfe_keys (line 287) | fn ctfe_keys(&self) -> Result> { function is_timerange_valid (line 303) | fn is_timerange_valid(range: Option<&TimeRange>, allow_expired: bool) ->... function verify (line 333) | fn verify(root: &SigstoreTrustRoot, cache_dir: Option<&Path>) { function cache_dir (line 356) | fn cache_dir() -> TempDir { function trust_root (line 360) | async fn trust_root(cache: Option<&Path>) -> SigstoreTrustRoot { function trust_root_fetch (line 368) | async fn trust_root_fetch(#[values(None, Some(cache_dir()))] cache: Opti... function trust_root_outdated (line 377) | async fn trust_root_outdated(cache_dir: TempDir) { function test_is_timerange_valid (line 392) | fn test_is_timerange_valid() { function test_load_missing_trust_client_config (line 437) | fn test_load_missing_trust_client_config( FILE: src/trust/sigstore/transport.rs type ReqwestTransport (line 36) | pub(crate) struct ReqwestTransport { method new (line 42) | pub(crate) fn new(client: Client) -> Self { method fetch (line 52) | async fn fetch(&self, url: Url) -> Result; method poll_next (line 99) | fn poll_next(mut self: Pin<&mut Self>, cx: &mut Context<'_>) -> Poll ReqwestTransport { function unsupported_scheme (line 123) | async fn unsupported_scheme() { function file_not_found_on_disk (line 134) | async fn file_not_found_on_disk() { function file_found_on_disk (line 145) | async fn file_found_on_disk() { FILE: tests/conformance/conformance.rs type Cli (line 29) | struct Cli { type Commands (line 35) | enum Commands { type Sign (line 43) | struct Sign { type SignBundle (line 61) | struct SignBundle { type Verify (line 75) | struct Verify { type VerifyBundle (line 97) | struct VerifyBundle { function main (line 114) | fn main() { function sign_bundle (line 132) | fn sign_bundle(args: SignBundle) -> anyhow::Result<()> { function verify_bundle (line 153) | fn verify_bundle(args: VerifyBundle) -> anyhow::Result<()> {