HomeSort by relevance Sort by last modified time
    Searched refs:CBS_data (Results 1 - 25 of 38) sorted by null

1 2

  /external/boringssl/src/crypto/bn/
bn_asn1.c 29 if (CBS_data(&child)[0] & 0x80) {
35 if (CBS_data(&child)[0] == 0x00 &&
37 !(CBS_data(&child)[1] & 0x80)) {
42 return BN_bin2bn(CBS_data(&child), CBS_len(&child), ret) != NULL;
58 return BN_bin2bn(CBS_data(&child), CBS_len(&child), ret) != NULL;
  /external/boringssl/src/crypto/bytestring/
ber.c 66 CBS_init(&in, CBS_data(orig_in), CBS_len(orig_in));
79 CBS_data(&contents)[header_len-1] == 0x80) {
104 OPENSSL_memcmp(CBS_data(contents), "\x00\x00", 2) == 0;
159 CBS_data(&contents)[header_len - 1] == 0x80) {
181 if (!CBB_add_bytes(out_contents, CBS_data(&contents),
246 !CBB_add_bytes(&result, CBS_data(&chunk), CBS_len(&chunk))) {
cbs.c 47 const uint8_t *CBS_data(const CBS *cbs) {
327 return CBS_data(cbs)[0] == tag_value;
340 data = CBS_data(&bytes);
442 boolean = CBS_data(&child2)[0];
490 (CBS_data(cbs)[byte_num] & (1 << bit_num)) != 0;
bytestring_test.cc 135 OPENSSL_memcmp(CBS_data(&contents), "\x01\x02", 2) != 0) {
196 OPENSSL_memcmp(CBS_data(&contents), "\x04\x01\x01", 3) != 0) {
208 CBS_data(&contents)[0] != 1) {
238 OPENSSL_memcmp(CBS_data(&contents), "\x01\x02", 2) != 0) {
248 OPENSSL_memcmp(CBS_data(&contents), "\x30\x02\x01\x02", 2) != 0) {
710 OPENSSL_memcmp(CBS_data(&out), test.out, test.out_len) != 0)) {
  /external/boringssl/src/crypto/ec/
ec_asn1.c 130 BN_bin2bn(CBS_data(&private_key), CBS_len(&private_key), NULL);
153 !EC_POINT_oct2point(group, ret->pub_key, CBS_data(&public_key),
162 ret->conv_form = (point_conversion_form_t)(CBS_data(&public_key)[0] & ~0x01);
250 uint8_t byte = CBS_data(cbs)[0];
252 (byte == 0 && CBS_len(cbs) > 1 && (CBS_data(cbs)[1] & 0x80) == 0)) {
275 OPENSSL_memcmp(CBS_data(&field_type), kPrimeField, sizeof(kPrimeField)) != 0 ||
306 CBS_init(out_base_x, CBS_data(&base), field_len);
307 CBS_init(out_base_y, CBS_data(&base) + field_len, field_len);
317 while (CBS_len(&a_copy) > 0 && CBS_data(&a_copy)[0] == 0) {
339 OPENSSL_memcmp(CBS_data(&named_curve), curve->oid, curve->oid_len) == 0)
    [all...]
  /external/boringssl/src/crypto/x509/
pkcs7.c 59 CBS_init(&in, CBS_data(cbs), CBS_len(cbs));
89 CBS_init(out, CBS_data(&signed_data), CBS_len(&signed_data));
127 inp = CBS_data(&cert);
133 assert(inp == CBS_data(&cert) + CBS_len(&cert));
195 inp = CBS_data(&crl_data);
201 assert(inp == CBS_data(&crl_data) + CBS_len(&crl_data));
  /external/boringssl/src/crypto/dsa/
dsa_asn1.c 243 *inp = CBS_data(&cbs);
271 *inp = CBS_data(&cbs);
299 *inp = CBS_data(&cbs);
327 *inp = CBS_data(&cbs);
  /external/boringssl/src/ssl/
tls_record.c 269 ssl->s3->read_sequence, (uint8_t *)CBS_data(&body),
332 CBS_data(out)[0] == SSL3_AL_WARNING &&
333 CBS_data(out)[1] == TLS1_AD_END_OF_EARLY_DATA) {
338 return ssl_process_alert(ssl, out_alert, CBS_data(out), CBS_len(out));
custom_extensions.c 155 !ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension),
180 !ext->parse_callback(ssl, value, CBS_data(extension), CBS_len(extension),
dtls_record.c 217 (uint8_t *)CBS_data(&body), CBS_len(&body))) {
243 return ssl_process_alert(ssl, out_alert, CBS_data(out), CBS_len(out));
t1_lib.c 221 out->random = CBS_data(&random);
223 out->session_id = CBS_data(&session_id);
243 out->cipher_suites = CBS_data(&cipher_suites);
245 out->compression_methods = CBS_data(&compression_methods);
264 out->extensions = CBS_data(&extensions);
301 *out_data = CBS_data(&cbs);
773 const uint8_t *d = CBS_data(&renegotiated_connection);
    [all...]
s3_both.c 583 CBS_data(&v2_client_hello),
589 CBS_data(&v2_client_hello), CBS_len(&v2_client_hello));
618 OPENSSL_memcpy(random + (SSL3_RANDOM_SIZE - rand_len), CBS_data(&challenge),
752 return SSL_TRANSCRIPT_update(&hs->transcript, CBS_data(&cbs), CBS_len(&cbs));
ssl_asn1.c 529 OPENSSL_memcpy(out, CBS_data(&value), CBS_len(&value));
613 OPENSSL_memcpy(ret->session_id, CBS_data(&session_id), CBS_len(&session_id));
615 OPENSSL_memcpy(ret->master_key, CBS_data(&master_key), CBS_len(&master_key));
665 OPENSSL_memcpy(ret->peer_sha256, CBS_data(&peer_sha256),
handshake_client.c 823 OPENSSL_memcpy(ssl->d1->cookie, CBS_data(&cookie), CBS_len(&cookie));
922 OPENSSL_memcpy(ssl->s3->server_random, CBS_data(&server_random), SSL3_RANDOM_SIZE);
941 OPENSSL_memcpy(hs->new_session->session_id, CBS_data(&session_id),
    [all...]
ssl_cert.c 474 SHA256(CBS_data(&certificate), CBS_len(&certificate), out_leaf_sha256);
685 OPENSSL_memcmp(CBS_data(&oid), kKeyUsageOID, sizeof(kKeyUsageOID)) !=
873 CRYPTO_BUFFER_new(CBS_data(&sct_list), CBS_len(&sct_list), NULL);
  /external/boringssl/src/crypto/evp/
evp_asn1.c 87 OPENSSL_memcmp(CBS_data(&oid), method->oid, method->oid_len) == 0) {
266 *inp = CBS_data(&cbs);
307 *inp = CBS_data(&cbs);
p_ec_asn1.c 111 !EC_POINT_oct2point(group, point, CBS_data(key), CBS_len(key), NULL) ||
  /external/boringssl/src/crypto/pkcs8/
pkcs8_x509.c 259 CBS_init(&in, CBS_data(sequence), CBS_len(sequence));
359 const uint8_t *inp = CBS_data(&cert);
366 if (inp != CBS_data(&cert) + CBS_len(&cert)) {
441 ctx->password_len, CBS_data(&encrypted_contents),
489 CBS_init(&in, CBS_data(ber_in), CBS_len(ber_in));
580 if (!pkcs12_key_gen(ctx.password, ctx.password_len, CBS_data(&salt),
588 if (NULL == HMAC(md, hmac_key, EVP_MD_size(md), CBS_data(&authsafes),
p5_pbev2.c 305 pass_len, CBS_data(&salt), CBS_len(&salt),
306 CBS_data(&iv), CBS_len(&iv), 0 /* decrypt */);
pkcs8.c 273 pass_len, CBS_data(&salt), CBS_len(&salt),
427 CBS_data(&ciphertext), CBS_len(&ciphertext))) {
  /external/boringssl/src/crypto/dh/
dh_asn1.c 148 *inp = CBS_data(&cbs);
  /external/boringssl/src/crypto/ecdsa/
ecdsa_asn1.c 215 *inp = CBS_data(&cbs);
  /external/boringssl/src/crypto/pool/
pool.c 139 return CRYPTO_BUFFER_new(CBS_data(cbs), CBS_len(cbs), pool);
  /external/boringssl/src/crypto/rsa/
rsa_asn1.c 390 *inp = CBS_data(&cbs);
418 *inp = CBS_data(&cbs);
  /external/boringssl/src/include/openssl/
bytestring.h 50 /* CBS_data returns a pointer to the contents of |cbs|. */
51 OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs);

Completed in 443 milliseconds

1 2