/external/boringssl/src/crypto/bn/ |
D | bn_asn1.c | 29 if (CBS_data(&child)[0] & 0x80) { in BN_parse_asn1_unsigned() 35 if (CBS_data(&child)[0] == 0x00 && in BN_parse_asn1_unsigned() 37 !(CBS_data(&child)[1] & 0x80)) { in BN_parse_asn1_unsigned() 42 return BN_bin2bn(CBS_data(&child), CBS_len(&child), ret) != NULL; in BN_parse_asn1_unsigned() 58 return BN_bin2bn(CBS_data(&child), CBS_len(&child), ret) != NULL; in BN_parse_asn1_unsigned_buggy()
|
/external/boringssl/src/crypto/bytestring/ |
D | ber.c | 66 CBS_init(&in, CBS_data(orig_in), CBS_len(orig_in)); in cbs_find_ber() 79 CBS_data(&contents)[header_len-1] == 0x80) { in cbs_find_ber() 104 OPENSSL_memcmp(CBS_data(contents), "\x00\x00", 2) == 0; in is_eoc() 159 CBS_data(&contents)[header_len - 1] == 0x80) { in cbs_convert_ber() 181 if (!CBB_add_bytes(out_contents, CBS_data(&contents), in cbs_convert_ber() 246 !CBB_add_bytes(&result, CBS_data(&chunk), CBS_len(&chunk))) { in CBS_get_asn1_implicit_string()
|
D | cbs.c | 47 const uint8_t *CBS_data(const CBS *cbs) { in CBS_data() function 327 return CBS_data(cbs)[0] == tag_value; in CBS_peek_asn1_tag() 340 data = CBS_data(&bytes); in CBS_get_asn1_uint64() 442 boolean = CBS_data(&child2)[0]; in CBS_get_optional_asn1_bool() 490 (CBS_data(cbs)[byte_num] & (1 << bit_num)) != 0; in CBS_asn1_bitstring_has_bit()
|
D | bytestring_test.cc | 135 OPENSSL_memcmp(CBS_data(&contents), "\x01\x02", 2) != 0) { in TestGetASN1() 196 OPENSSL_memcmp(CBS_data(&contents), "\x04\x01\x01", 3) != 0) { in TestGetASN1() 208 CBS_data(&contents)[0] != 1) { in TestGetASN1() 238 OPENSSL_memcmp(CBS_data(&contents), "\x01\x02", 2) != 0) { in TestGetASN1() 248 OPENSSL_memcmp(CBS_data(&contents), "\x30\x02\x01\x02", 2) != 0) { in TestGetASN1() 710 OPENSSL_memcmp(CBS_data(&out), test.out, test.out_len) != 0)) { in TestImplicitString()
|
/external/boringssl/src/crypto/ec/ |
D | ec_asn1.c | 130 BN_bin2bn(CBS_data(&private_key), CBS_len(&private_key), NULL); in EC_KEY_parse_private_key() 153 !EC_POINT_oct2point(group, ret->pub_key, CBS_data(&public_key), in EC_KEY_parse_private_key() 162 ret->conv_form = (point_conversion_form_t)(CBS_data(&public_key)[0] & ~0x01); in EC_KEY_parse_private_key() 250 uint8_t byte = CBS_data(cbs)[0]; in is_unsigned_integer() 252 (byte == 0 && CBS_len(cbs) > 1 && (CBS_data(cbs)[1] & 0x80) == 0)) { in is_unsigned_integer() 275 OPENSSL_memcmp(CBS_data(&field_type), kPrimeField, sizeof(kPrimeField)) != 0 || in parse_explicit_prime_curve() 306 CBS_init(out_base_x, CBS_data(&base), field_len); in parse_explicit_prime_curve() 307 CBS_init(out_base_y, CBS_data(&base) + field_len, field_len); in parse_explicit_prime_curve() 317 while (CBS_len(&a_copy) > 0 && CBS_data(&a_copy)[0] == 0) { in integers_equal() 339 OPENSSL_memcmp(CBS_data(&named_curve), curve->oid, curve->oid_len) == 0) { in EC_KEY_parse_curve_name() [all …]
|
/external/boringssl/src/crypto/x509/ |
D | pkcs7.c | 59 CBS_init(&in, CBS_data(cbs), CBS_len(cbs)); in pkcs7_parse_header() 89 CBS_init(out, CBS_data(&signed_data), CBS_len(&signed_data)); in pkcs7_parse_header() 127 inp = CBS_data(&cert); in PKCS7_get_certificates() 133 assert(inp == CBS_data(&cert) + CBS_len(&cert)); in PKCS7_get_certificates() 195 inp = CBS_data(&crl_data); in PKCS7_get_CRLs() 201 assert(inp == CBS_data(&crl_data) + CBS_len(&crl_data)); in PKCS7_get_CRLs()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 259 CBS_init(&in, CBS_data(sequence), CBS_len(sequence)); in PKCS12_handle_sequence() 359 const uint8_t *inp = CBS_data(&cert); in PKCS12_handle_safe_bag() 366 if (inp != CBS_data(&cert) + CBS_len(&cert)) { in PKCS12_handle_safe_bag() 441 ctx->password_len, CBS_data(&encrypted_contents), in PKCS12_handle_content_info() 489 CBS_init(&in, CBS_data(ber_in), CBS_len(ber_in)); in PKCS12_get_key_and_certs() 580 if (!pkcs12_key_gen(ctx.password, ctx.password_len, CBS_data(&salt), in PKCS12_get_key_and_certs() 588 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes), in PKCS12_get_key_and_certs()
|
D | p5_pbev2.c | 305 pass_len, CBS_data(&salt), CBS_len(&salt), in PKCS5_pbe2_decrypt_init() 306 CBS_data(&iv), CBS_len(&iv), 0 /* decrypt */); in PKCS5_pbe2_decrypt_init()
|
D | pkcs8.c | 273 pass_len, CBS_data(&salt), CBS_len(&salt), in pkcs12_pbe_decrypt_init() 427 CBS_data(&ciphertext), CBS_len(&ciphertext))) { in PKCS8_parse_encrypted_private_key()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa_asn1.c | 243 *inp = CBS_data(&cbs); in d2i_DSA_SIG() 271 *inp = CBS_data(&cbs); in d2i_DSAPublicKey() 299 *inp = CBS_data(&cbs); in d2i_DSAPrivateKey() 327 *inp = CBS_data(&cbs); in d2i_DSAparams()
|
/external/boringssl/src/ssl/ |
D | tls_record.c | 269 ssl->s3->read_sequence, (uint8_t *)CBS_data(&body), in tls_open_record() 332 CBS_data(out)[0] == SSL3_AL_WARNING && in tls_open_record() 333 CBS_data(out)[1] == TLS1_AD_END_OF_EARLY_DATA) { in tls_open_record() 338 return ssl_process_alert(ssl, out_alert, CBS_data(out), CBS_len(out)); in tls_open_record()
|
D | t1_lib.c | 221 out->random = CBS_data(&random); in ssl_client_hello_init() 223 out->session_id = CBS_data(&session_id); in ssl_client_hello_init() 243 out->cipher_suites = CBS_data(&cipher_suites); in ssl_client_hello_init() 245 out->compression_methods = CBS_data(&compression_methods); in ssl_client_hello_init() 264 out->extensions = CBS_data(&extensions); in ssl_client_hello_init() 301 *out_data = CBS_data(&cbs); in SSL_early_callback_ctx_extension_get() 773 const uint8_t *d = CBS_data(&renegotiated_connection); in ext_ri_parse_serverhello() 1208 const uint8_t *const orig_contents = CBS_data(contents); in ext_npn_parse_serverhello() 1448 OPENSSL_memcmp(CBS_data(&client_protocol_name), in ext_alpn_parse_serverhello() 1449 CBS_data(&protocol_name), in ext_alpn_parse_serverhello() [all …]
|
D | dtls_record.c | 217 (uint8_t *)CBS_data(&body), CBS_len(&body))) { in dtls_open_record() 243 return ssl_process_alert(ssl, out_alert, CBS_data(out), CBS_len(out)); in dtls_open_record()
|
D | custom_extensions.c | 155 !ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension), in custom_ext_parse_serverhello() 180 !ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension), in custom_ext_parse_clienthello()
|
D | handshake_client.c | 823 OPENSSL_memcpy(ssl->d1->cookie, CBS_data(&cookie), CBS_len(&cookie)); in dtls1_get_hello_verify() 922 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_random), SSL3_RANDOM_SIZE); in ssl3_get_server_hello() 941 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id), in ssl3_get_server_hello() 1262 dh->p = BN_bin2bn(CBS_data(&dh_p), CBS_len(&dh_p), NULL); in ssl3_get_server_key_exchange() 1263 dh->g = BN_bin2bn(CBS_data(&dh_g), CBS_len(&dh_g), NULL); in ssl3_get_server_key_exchange() 1324 CBS_init(¶meter, CBS_data(&server_key_exchange_orig), in ssl3_get_server_key_exchange() 1365 !CBB_add_bytes(&transcript, CBS_data(¶meter), CBS_len(¶meter)) || in ssl3_get_server_key_exchange() 1374 ssl, CBS_data(&signature), CBS_len(&signature), signature_algorithm, in ssl3_get_server_key_exchange() 1917 if (!EVP_Digest(CBS_data(&ticket), CBS_len(&ticket), in ssl3_get_new_session_ticket()
|
D | ssl_asn1.c | 529 OPENSSL_memcpy(out, CBS_data(&value), CBS_len(&value)); in SSL_SESSION_parse_bounded_octet_string() 613 OPENSSL_memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id)); in SSL_SESSION_parse() 615 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key)); in SSL_SESSION_parse() 665 OPENSSL_memcpy(ret->peer_sha256, CBS_data(&peer_sha256), in SSL_SESSION_parse()
|
D | s3_both.c | 583 CBS_data(&v2_client_hello), in read_v2_client_hello() 589 CBS_data(&v2_client_hello), CBS_len(&v2_client_hello)); in read_v2_client_hello() 618 OPENSSL_memcpy(random + (SSL3_RANDOM_SIZE - rand_len), CBS_data(&challenge), in read_v2_client_hello() 752 return SSL_TRANSCRIPT_update(&hs->transcript, CBS_data(&cbs), CBS_len(&cbs)); in ssl_hash_current_message()
|
D | ssl_cert.c | 474 SHA256(CBS_data(&certificate), CBS_len(&certificate), out_leaf_sha256); in STACK_OF() 685 OPENSSL_memcmp(CBS_data(&oid), kKeyUsageOID, sizeof(kKeyUsageOID)) != in ssl_cert_check_digital_signature_key_usage() 873 CRYPTO_BUFFER_new(CBS_data(&sct_list), CBS_len(&sct_list), NULL); in set_signed_cert_timestamp_list()
|
D | tls13_enc.c | 440 if (!EVP_Digest(CBS_data(&message), CBS_len(&message) - CBS_len(binders) - 2, in tls13_verify_psk_binder() 459 CRYPTO_memcmp(CBS_data(&binder), verify_data, hash_len) == 0; in tls13_verify_psk_binder()
|
/external/boringssl/src/crypto/evp/ |
D | evp_asn1.c | 87 OPENSSL_memcmp(CBS_data(&oid), method->oid, method->oid_len) == 0) { in parse_key_type() 266 *inp = CBS_data(&cbs); in d2i_PrivateKey() 307 *inp = CBS_data(&cbs); in d2i_AutoPrivateKey()
|
D | p_ec_asn1.c | 111 !EC_POINT_oct2point(group, point, CBS_data(key), CBS_len(key), NULL) || in eckey_pub_decode()
|
/external/boringssl/src/crypto/dh/ |
D | dh_asn1.c | 148 *inp = CBS_data(&cbs); in d2i_DHparams()
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_asn1.c | 390 *inp = CBS_data(&cbs); in d2i_RSAPublicKey() 418 *inp = CBS_data(&cbs); in d2i_RSAPrivateKey()
|
/external/boringssl/src/crypto/ecdsa/ |
D | ecdsa_asn1.c | 215 *inp = CBS_data(&cbs); in d2i_ECDSA_SIG()
|
/external/boringssl/src/crypto/pool/ |
D | pool.c | 139 return CRYPTO_BUFFER_new(CBS_data(cbs), CBS_len(cbs), pool); in CRYPTO_BUFFER_new_from_CBS()
|