/external/boringssl/src/crypto/bytestring/ |
internal.h | 42 OPENSSL_EXPORT int CBS_asn1_ber_to_der(CBS *in, uint8_t **out, size_t *out_len); 56 OPENSSL_EXPORT int CBS_get_asn1_implicit_string(CBS *in, CBS *out,
|
cbs.c | 26 void CBS_init(CBS *cbs, const uint8_t *data, size_t len) { 27 cbs->data = data; 28 cbs->len = len; 31 static int cbs_get(CBS *cbs, const uint8_t **p, size_t n) { 32 if (cbs->len < n) { 36 *p = cbs->data; 37 cbs->data += n; 38 cbs->len -= n [all...] |
ber.c | 59 static int cbs_find_ber(const CBS *orig_in, char *ber_found, unsigned depth) { 60 CBS in; 70 CBS contents; 102 static char is_eoc(size_t header_len, CBS *contents) { 114 static int cbs_convert_ber(CBS *in, CBB *out, unsigned string_tag, 123 CBS contents; 195 int CBS_asn1_ber_to_der(CBS *in, uint8_t **out, size_t *out_len) { 221 int CBS_get_asn1_implicit_string(CBS *in, CBS *out, uint8_t **out_storage, 237 CBS child [all...] |
/external/boringssl/src/include/openssl/ |
bytestring.h | 27 * A "CBS" (CRYPTO ByteString) represents a string of bytes in memory and 42 /* CBS_init sets |cbs| to point to |data|. It does not take ownership of 44 OPENSSL_EXPORT void CBS_init(CBS *cbs, const uint8_t *data, size_t len); 46 /* CBS_skip advances |cbs| by |len| bytes. It returns one on success and zero 48 OPENSSL_EXPORT int CBS_skip(CBS *cbs, size_t len); 50 /* CBS_data returns a pointer to the contents of |cbs|. */ 51 OPENSSL_EXPORT const uint8_t *CBS_data(const CBS *cbs); [all...] |
pkcs7.h | 36 /* PKCS7_get_raw_certificates parses a PKCS#7, SignedData structure from |cbs| 40 STACK_OF(CRYPTO_BUFFER) *out_certs, CBS *cbs, CRYPTO_BUFFER_POOL *pool); variable 44 OPENSSL_EXPORT int PKCS7_get_certificates(STACK_OF(X509) *out_certs, CBS *cbs); variable 51 /* PKCS7_get_CRLs parses a PKCS#7, SignedData structure from |cbs| and appends 54 OPENSSL_EXPORT int PKCS7_get_CRLs(STACK_OF(X509_CRL) *out_crls, CBS *cbs); variable
|
pool.h | 53 CBS *cbs, CRYPTO_BUFFER_POOL *pool); 72 OPENSSL_EXPORT void CRYPTO_BUFFER_init_CBS(const CRYPTO_BUFFER *buf, CBS *out);
|
pkcs8.h | 115 * the EncryptedPrivateKeyInfo structure from |cbs| and advances |cbs|. It 117 OPENSSL_EXPORT EVP_PKEY *PKCS8_parse_encrypted_private_key(CBS *cbs, 127 CBS *in, const char *password);
|
/external/boringssl/src/crypto/digest_extra/ |
internal.h | 25 const EVP_MD *EVP_parse_digest_algorithm(CBS *cbs);
|
digest_extra.c | 141 static const EVP_MD *cbs_to_md(const CBS *cbs) { 143 if (CBS_len(cbs) == kMDOIDs[i].oid_len && 144 OPENSSL_memcmp(CBS_data(cbs), kMDOIDs[i].oid, kMDOIDs[i].oid_len) == 159 CBS cbs; local 160 CBS_init(&cbs, obj->data, obj->length); 161 return cbs_to_md(&cbs); 164 const EVP_MD *EVP_parse_digest_algorithm(CBS *cbs) { [all...] |
/external/boringssl/src/crypto/pkcs7/ |
internal.h | 26 * SignedData blob from |cbs| and sets |*out| to point to the rest of the 33 int pkcs7_parse_header(uint8_t **der_bytes, CBS *out, CBS *cbs);
|
pkcs7.c | 36 * SignedData blob from |cbs| and sets |*out| to point to the rest of the 43 int pkcs7_parse_header(uint8_t **der_bytes, CBS *out, CBS *cbs) { 45 CBS in, content_info, content_type, wrapped_signed_data, signed_data; 50 if (!CBS_asn1_ber_to_der(cbs, der_bytes, &der_len)) { 56 CBS_init(&in, CBS_data(cbs), CBS_len(cbs)); 95 int PKCS7_get_raw_certificates(STACK_OF(CRYPTO_BUFFER) *out_certs, CBS *cbs, [all...] |
/external/boringssl/src/crypto/bn_extra/ |
bn_asn1.c | 21 int BN_parse_asn1_unsigned(CBS *cbs, BIGNUM *ret) { 22 CBS child; 23 if (!CBS_get_asn1(cbs, &child, CBS_ASN1_INTEGER) || 45 int BN_parse_asn1_unsigned_buggy(CBS *cbs, BIGNUM *ret) { 46 CBS child; 47 if (!CBS_get_asn1(cbs, &child, CBS_ASN1_INTEGER) ||
|
/external/boringssl/src/crypto/pkcs8/ |
internal.h | 70 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, 98 const char *pass, size_t pass_len, CBS *param); 105 const char *pass, size_t pass_len, CBS *param);
|
pkcs8_x509.c | 109 CBS cbs; 110 CBS_init(&cbs, der, (size_t)der_len); 111 EVP_PKEY *ret = EVP_parse_private_key(&cbs); 112 if (ret == NULL || CBS_len(&cbs) != 0) { 171 CBS cbs; 172 CBS_init(&cbs, in, in_len); 173 pkey = PKCS8_parse_encrypted_private_key(&cbs, pass, pass_len); 174 if (pkey == NULL || CBS_len(&cbs) != 0) [all...] |
p5_pbev2.c | 117 static const EVP_CIPHER *cbs_to_cipher(const CBS *cbs) { 119 if (CBS_mem_equal(cbs, kCipherOIDs[i].oid, kCipherOIDs[i].oid_len)) { 210 const char *pass, size_t pass_len, CBS *param) { 211 CBS pbe_param, kdf, kdf_obj, enc_scheme, enc_obj; 237 CBS pbkdf2_params, salt; 268 CBS alg_id, prf; 284 CBS null; 297 CBS iv;
|
/external/boringssl/src/crypto/evp/ |
evp_asn1.c | 78 static int parse_key_type(CBS *cbs, int *out_type) { 79 CBS oid; 80 if (!CBS_get_asn1(cbs, &oid, CBS_ASN1_OBJECT)) { 96 EVP_PKEY *EVP_parse_public_key(CBS *cbs) { 98 CBS spki, algorithm, key; 101 if (!CBS_get_asn1(cbs, &spki, CBS_ASN1_SEQUENCE) || 146 EVP_PKEY *EVP_parse_private_key(CBS *cbs) { 244 CBS cbs; local 273 CBS cbs, sequence; local 299 CBS cbs; local [all...] |
p_rsa_asn1.c | 98 static int rsa_pub_decode(EVP_PKEY *out, CBS *params, CBS *key) { 107 CBS null; 155 static int rsa_priv_decode(EVP_PKEY *out, CBS *params, CBS *key) { 157 CBS null;
|
internal.h | 81 int (*pub_decode)(EVP_PKEY *out, CBS *params, CBS *key); 93 int (*priv_decode)(EVP_PKEY *out, CBS *params, CBS *key);
|
/external/boringssl/src/crypto/dsa/ |
dsa_asn1.c | 67 static int parse_integer(CBS *cbs, BIGNUM **out) { 73 return BN_parse_asn1_unsigned(cbs, *out); 85 DSA_SIG *DSA_SIG_parse(CBS *cbs) { 90 CBS child; 91 if (!CBS_get_asn1(cbs, &child, CBS_ASN1_SEQUENCE) || 114 DSA *DSA_parse_public_key(CBS *cbs) { 119 CBS child 233 CBS cbs; local 261 CBS cbs; local 289 CBS cbs; local 317 CBS cbs; local [all...] |
/external/boringssl/src/crypto/rsa_extra/ |
rsa_asn1.c | 72 static int parse_integer_buggy(CBS *cbs, BIGNUM **out, int buggy) { 79 return BN_parse_asn1_unsigned_buggy(cbs, *out); 81 return BN_parse_asn1_unsigned(cbs, *out); 84 static int parse_integer(CBS *cbs, BIGNUM **out) { 85 return parse_integer_buggy(cbs, out, 0 /* not buggy */); 97 static RSA *parse_public_key(CBS *cbs, int buggy) { 102 CBS child 135 CBS cbs; local 224 CBS cbs; local 272 CBS cbs; local 300 CBS cbs; local [all...] |
/external/boringssl/src/crypto/dh/ |
dh_asn1.c | 68 static int parse_integer(CBS *cbs, BIGNUM **out) { 74 return BN_parse_asn1_unsigned(cbs, *out); 86 DH *DH_parse_parameters(CBS *cbs) { 92 CBS child; 93 if (!CBS_get_asn1(cbs, &child, CBS_ASN1_SEQUENCE) || 138 CBS cbs; local 139 CBS_init(&cbs, *inp, (size_t)len) [all...] |
/external/boringssl/src/ssl/ |
ssl_cert.cc | 257 CBS cert_cbs; 428 CBS *cbs, 439 CBS certificate_list; 440 if (!CBS_get_u24_length_prefixed(cbs, &certificate_list)) { 447 CBS certificate; 522 static int ssl_cert_skip_to_spki(const CBS *in, CBS *out_tbs_cert) { 538 CBS buf = *in; 540 CBS toplevel [all...] |
t1_lib.cc | 147 static int tls1_check_duplicate_extensions(const CBS *cbs) { 148 CBS extensions = *cbs; 156 CBS extension; 178 extensions = *cbs; 180 CBS extension; 212 CBS client_hello, random, session_id; 228 CBS cookie; 235 CBS cipher_suites, compression_methods 296 CBS cbs; local [all...] |
ssl_asn1.cc | 475 * explicitly tagged with |tag| from |cbs| and saves it in |*out|. On 480 static int SSL_SESSION_parse_string(CBS *cbs, char **out, unsigned tag) { 481 CBS value; 483 if (!CBS_get_optional_asn1_octet_string(cbs, &value, &present, tag)) { 504 * explicitly tagged with |tag| from |cbs| and stows it in |*out_ptr| 509 static int SSL_SESSION_parse_octet_string(CBS *cbs, uint8_t **out_ptr, 511 CBS value; 512 if (!CBS_get_optional_asn1_octet_string(cbs, &value, NULL, tag)) 810 CBS cbs; local [all...] |
/external/boringssl/src/crypto/ec_extra/ |
ec_asn1.c | 75 EC_KEY *EC_KEY_parse_private_key(CBS *cbs, const EC_GROUP *group) { 76 CBS ec_private_key, private_key; 78 if (!CBS_get_asn1(cbs, &ec_private_key, CBS_ASN1_SEQUENCE) || 94 CBS child; 142 CBS child, public_key; 245 /* is_unsigned_integer returns one if |cbs| is a valid unsigned DER INTEGER and 247 static int is_unsigned_integer(const CBS *cbs) { 248 if (CBS_len(cbs) == 0) 434 CBS cbs; local 463 CBS cbs; local [all...] |