/external/rust/crates/quiche/deps/boringssl/src/crypto/bytestring/ |
D | asn1_compat.c | 32 size_t der_len; in CBB_finish_i2d() local 33 if (!CBB_finish(cbb, &der, &der_len)) { in CBB_finish_i2d() 37 if (der_len > INT_MAX) { in CBB_finish_i2d() 46 OPENSSL_memcpy(*outp, der, der_len); in CBB_finish_i2d() 47 *outp += der_len; in CBB_finish_i2d() 51 return (int)der_len; in CBB_finish_i2d()
|
/external/boringssl/src/crypto/bytestring/ |
D | asn1_compat.c | 32 size_t der_len; in CBB_finish_i2d() local 33 if (!CBB_finish(cbb, &der, &der_len)) { in CBB_finish_i2d() 37 if (der_len > INT_MAX) { in CBB_finish_i2d() 46 OPENSSL_memcpy(*outp, der, der_len); in CBB_finish_i2d() 47 *outp += der_len; in CBB_finish_i2d() 51 return (int)der_len; in CBB_finish_i2d()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 472 static void TestCertReparse(const uint8_t *der_bytes, size_t der_len) { in TestCertReparse() argument 481 CBS_init(&pkcs7, der_bytes, der_len); in TestCertReparse() 486 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertReparse() 502 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertReparse() 511 bssl::UniquePtr<PKCS7> pkcs7_obj(d2i_PKCS7(nullptr, &ptr, der_len)); in TestCertReparse() 513 EXPECT_EQ(ptr, der_bytes + der_len); in TestCertReparse() 530 EXPECT_EQ(Bytes(der_bytes, der_len), Bytes(result3_data, result3_len)); in TestCertReparse() 554 static void TestCRLReparse(const uint8_t *der_bytes, size_t der_len) { in TestCRLReparse() argument 563 CBS_init(&pkcs7, der_bytes, der_len); in TestCRLReparse() 568 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCRLReparse() [all …]
|
/external/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 472 static void TestCertReparse(const uint8_t *der_bytes, size_t der_len) { in TestCertReparse() argument 481 CBS_init(&pkcs7, der_bytes, der_len); in TestCertReparse() 486 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertReparse() 502 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertReparse() 511 bssl::UniquePtr<PKCS7> pkcs7_obj(d2i_PKCS7(nullptr, &ptr, der_len)); in TestCertReparse() 513 EXPECT_EQ(ptr, der_bytes + der_len); in TestCertReparse() 530 EXPECT_EQ(Bytes(der_bytes, der_len), Bytes(result3_data, result3_len)); in TestCertReparse() 554 static void TestCRLReparse(const uint8_t *der_bytes, size_t der_len) { in TestCRLReparse() argument 563 CBS_init(&pkcs7, der_bytes, der_len); in TestCRLReparse() 568 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCRLReparse() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/x509/ |
D | x509spki.c | 115 int der_len; in NETSCAPE_SPKI_b64_encode() local 116 der_len = i2d_NETSCAPE_SPKI(spki, NULL); in NETSCAPE_SPKI_b64_encode() 117 if (!EVP_EncodedLength(&b64_len, der_len)) { in NETSCAPE_SPKI_b64_encode() 121 der_spki = OPENSSL_malloc(der_len); in NETSCAPE_SPKI_b64_encode() 134 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len); in NETSCAPE_SPKI_b64_encode()
|
/external/boringssl/src/crypto/x509/ |
D | x509spki.c | 115 int der_len; in NETSCAPE_SPKI_b64_encode() local 116 der_len = i2d_NETSCAPE_SPKI(spki, NULL); in NETSCAPE_SPKI_b64_encode() 117 if (!EVP_EncodedLength(&b64_len, der_len)) { in NETSCAPE_SPKI_b64_encode() 121 der_spki = OPENSSL_malloc(der_len); in NETSCAPE_SPKI_b64_encode() 134 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len); in NETSCAPE_SPKI_b64_encode()
|
/external/libchrome/crypto/ |
D | rsa_private_key.cc | 86 size_t der_len; in ExportPrivateKey() local 90 !CBB_finish(cbb.get(), &der, &der_len)) { in ExportPrivateKey() 93 output->assign(der, der + der_len); in ExportPrivateKey() 101 size_t der_len; in ExportPublicKey() local 105 !CBB_finish(cbb.get(), &der, &der_len)) { in ExportPublicKey() 108 output->assign(der, der + der_len); in ExportPublicKey()
|
/external/openscreen/util/crypto/ |
D | rsa_private_key.cc | 96 size_t der_len; in ExportPrivateKey() local 100 !CBB_finish(cbb.get(), &der, &der_len)) { in ExportPrivateKey() 104 std::vector<uint8_t> output(der, der + der_len); in ExportPrivateKey() 113 size_t der_len; in ExportPublicKey() local 117 !CBB_finish(cbb.get(), &der, &der_len)) { in ExportPublicKey() 121 std::vector<uint8_t> output(der, der + der_len); in ExportPublicKey()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/dh/ |
D | dh_test.cc | 353 size_t der_len; in TestASN1() local 356 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 360 if (der_len != sizeof(kParams) || in TestASN1() 361 OPENSSL_memcmp(der, kParams, der_len) != 0) { in TestASN1() 399 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 403 if (der_len != sizeof(kParamsDSA) || in TestASN1() 404 OPENSSL_memcmp(der, kParamsDSA, der_len) != 0) { in TestASN1()
|
/external/boringssl/src/crypto/dh_extra/ |
D | dh_test.cc | 354 size_t der_len; in TestASN1() local 357 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 361 if (der_len != sizeof(kParams) || in TestASN1() 362 OPENSSL_memcmp(der, kParams, der_len) != 0) { in TestASN1() 400 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 404 if (der_len != sizeof(kParamsDSA) || in TestASN1() 405 OPENSSL_memcmp(der, kParamsDSA, der_len) != 0) { in TestASN1()
|
/external/boringssl/src/ssl/ |
D | ssl_privkey.cc | 330 int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { in SSL_use_RSAPrivateKey_ASN1() argument 331 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); in SSL_use_RSAPrivateKey_ASN1() 350 size_t der_len) { in SSL_use_PrivateKey_ASN1() argument 351 if (der_len > LONG_MAX) { in SSL_use_PrivateKey_ASN1() 357 UniquePtr<EVP_PKEY> pkey(d2i_PrivateKey(type, NULL, &p, (long)der_len)); in SSL_use_PrivateKey_ASN1() 358 if (!pkey || p != der + der_len) { in SSL_use_PrivateKey_ASN1() 383 size_t der_len) { in SSL_CTX_use_RSAPrivateKey_ASN1() argument 384 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); in SSL_CTX_use_RSAPrivateKey_ASN1() 403 size_t der_len) { in SSL_CTX_use_PrivateKey_ASN1() argument 404 if (der_len > LONG_MAX) { in SSL_CTX_use_PrivateKey_ASN1() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | ssl_privkey.cc | 330 int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { in SSL_use_RSAPrivateKey_ASN1() argument 331 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); in SSL_use_RSAPrivateKey_ASN1() 350 size_t der_len) { in SSL_use_PrivateKey_ASN1() argument 351 if (der_len > LONG_MAX) { in SSL_use_PrivateKey_ASN1() 357 UniquePtr<EVP_PKEY> pkey(d2i_PrivateKey(type, NULL, &p, (long)der_len)); in SSL_use_PrivateKey_ASN1() 358 if (!pkey || p != der + der_len) { in SSL_use_PrivateKey_ASN1() 383 size_t der_len) { in SSL_CTX_use_RSAPrivateKey_ASN1() argument 384 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); in SSL_CTX_use_RSAPrivateKey_ASN1() 403 size_t der_len) { in SSL_CTX_use_PrivateKey_ASN1() argument 404 if (der_len > LONG_MAX) { in SSL_CTX_use_PrivateKey_ASN1() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 307 size_t der_len; in RSAPublicKey_dup() local 308 if (!RSA_public_key_to_bytes(&der, &der_len, rsa)) { in RSAPublicKey_dup() 311 RSA *ret = RSA_public_key_from_bytes(der, der_len); in RSAPublicKey_dup() 318 size_t der_len; in RSAPrivateKey_dup() local 319 if (!RSA_private_key_to_bytes(&der, &der_len, rsa)) { in RSAPrivateKey_dup() 322 RSA *ret = RSA_private_key_from_bytes(der, der_len); in RSAPrivateKey_dup()
|
D | rsa_test.cc | 387 size_t der_len; member 401 RSA_private_key_from_bytes(param.der, param.der_len)); in TEST_P() 536 size_t der_len; in TEST() local 537 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, key.get())); in TEST() 539 key.reset(RSA_private_key_from_bytes(der, der_len)); in TEST() 596 size_t der_len; in TEST() local 597 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 599 EXPECT_EQ(Bytes(kKey1, sizeof(kKey1) - 1), Bytes(der, der_len)); in TEST() 602 ASSERT_TRUE(RSA_public_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 606 rsa.reset(RSA_public_key_from_bytes(der, der_len)); in TEST() [all …]
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_asn1.c | 307 size_t der_len; in RSAPublicKey_dup() local 308 if (!RSA_public_key_to_bytes(&der, &der_len, rsa)) { in RSAPublicKey_dup() 311 RSA *ret = RSA_public_key_from_bytes(der, der_len); in RSAPublicKey_dup() 318 size_t der_len; in RSAPrivateKey_dup() local 319 if (!RSA_private_key_to_bytes(&der, &der_len, rsa)) { in RSAPrivateKey_dup() 322 RSA *ret = RSA_private_key_from_bytes(der, der_len); in RSAPrivateKey_dup()
|
D | rsa_test.cc | 387 size_t der_len; member 401 RSA_private_key_from_bytes(param.der, param.der_len)); in TEST_P() 538 size_t der_len; in TEST() local 539 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, key.get())); in TEST() 541 key.reset(RSA_private_key_from_bytes(der, der_len)); in TEST() 598 size_t der_len; in TEST() local 599 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 601 EXPECT_EQ(Bytes(kKey1, sizeof(kKey1) - 1), Bytes(der, der_len)); in TEST() 604 ASSERT_TRUE(RSA_public_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 608 rsa.reset(RSA_public_key_from_bytes(der, der_len)); in TEST() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | sae_pk_gen.c | 20 size_t der_len; in main() local 59 der = os_readfile(argv[1], &der_len); in main() 66 key = crypto_ec_key_parse_priv((u8 *) der, der_len); in main() 134 b64 = base64_encode(der, der_len, NULL); in main()
|
/external/rust/crates/quiche/deps/boringssl/src/fuzz/ |
D | pkcs8.cc | 29 size_t der_len; in LLVMFuzzerTestOneInput() local 33 CBB_finish(&cbb, &der, &der_len)) { in LLVMFuzzerTestOneInput()
|
D | spki.cc | 30 size_t der_len; in LLVMFuzzerTestOneInput() local 34 CBB_finish(&cbb, &der, &der_len)) { in LLVMFuzzerTestOneInput()
|
/external/oss-fuzz/projects/boringssl/ |
D | fuzz_pkcs8.cc | 43 size_t der_len; in DEFINE_PROTO_FUZZER() local 47 CBB_finish(cbb.get(), &der, &der_len)) { in DEFINE_PROTO_FUZZER()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_cred.c | 112 size_t der_len; in tlsv1_add_cert() local 133 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 270 size_t der_len; in tlsv1_set_key_pem() local 296 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_set_key_pem() 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() 311 size_t der_len; in tlsv1_set_key_enc_pem() local 324 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 1208 size_t der_len; in tlsv1_set_dhparams_blob() local [all …]
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_test.cc | 218 static void TestDecrypt(const uint8_t *der, size_t der_len, in TestDecrypt() argument 221 bssl::UniquePtr<X509_SIG> sig(d2i_X509_SIG(NULL, &data, der_len)); in TestDecrypt() 223 ASSERT_EQ(der + der_len, data); in TestDecrypt()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/pkcs8/ |
D | pkcs8_test.cc | 218 static void TestDecrypt(const uint8_t *der, size_t der_len, in TestDecrypt() argument 221 bssl::UniquePtr<X509_SIG> sig(d2i_X509_SIG(NULL, &data, der_len)); in TestDecrypt() 223 ASSERT_EQ(der + der_len, data); in TestDecrypt()
|
D | pkcs8_x509.c | 119 int der_len = i2d_PKCS8_PRIV_KEY_INFO(p8, &der); variable 120 if (der_len < 0) { 125 CBS_init(&cbs, der, (size_t)der_len); 141 size_t der_len; in EVP_PKEY2PKCS8() local 144 !CBB_finish(&cbb, &der, &der_len) || in EVP_PKEY2PKCS8() 145 der_len > LONG_MAX) { in EVP_PKEY2PKCS8() 152 PKCS8_PRIV_KEY_INFO *p8 = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, (long)der_len); in EVP_PKEY2PKCS8() 153 if (p8 == NULL || p != der + der_len) { in EVP_PKEY2PKCS8() 219 size_t der_len; in PKCS8_encrypt() local 225 !CBB_finish(&cbb, &der, &der_len)) { in PKCS8_encrypt() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 607 size_t der_len; in TEST() local 610 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 612 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); in TEST() 654 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 656 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); in TEST() 661 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 663 EXPECT_EQ(Bytes(kPrivateKeyPKCS8), Bytes(der, der_len)); in TEST()
|