/external/boringssl/src/crypto/bytestring/ |
asn1_compat.c | 32 size_t der_len; local 33 if (!CBB_finish(cbb, &der, &der_len)) { 37 if (der_len > INT_MAX) { 46 OPENSSL_memcpy(*outp, der, der_len); 47 *outp += der_len; 51 return (int)der_len;
|
bytestring_test.cc | 558 size_t der_len, const uint8_t *ber, 570 EXPECT_EQ(Bytes(der_expected, der_len), Bytes(ber, ber_len)); 572 EXPECT_NE(Bytes(der_expected, der_len), Bytes(ber, ber_len)); 573 EXPECT_EQ(Bytes(der_expected, der_len), Bytes(out, out_len)); [all...] |
/external/libchrome/crypto/ |
rsa_private_key.cc | 87 size_t der_len; local 91 !CBB_finish(cbb.get(), &der, &der_len)) { 94 output->assign(der, der + der_len); 102 size_t der_len; local 106 !CBB_finish(cbb.get(), &der, &der_len)) { 109 output->assign(der, der + der_len);
|
/external/boringssl/src/crypto/x509/ |
x509spki.c | 115 int der_len; local 116 der_len = i2d_NETSCAPE_SPKI(spki, NULL); 117 if (!EVP_EncodedLength(&b64_len, der_len)) { 121 der_spki = OPENSSL_malloc(der_len); 134 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len);
|
a_strex.c | 287 int outlen, der_len; local 300 der_len = i2d_ASN1_TYPE(&t, NULL); 301 der_buf = OPENSSL_malloc(der_len); 306 outlen = do_hex_dump(io_ch, arg, der_buf, der_len);
|
/external/boringssl/src/ssl/ |
ssl_privkey.cc | 312 int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { 313 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); 332 size_t der_len) { 333 if (der_len > LONG_MAX) { 339 UniquePtr<EVP_PKEY> pkey(d2i_PrivateKey(type, NULL, &p, (long)der_len)); 340 if (!pkey || p != der + der_len) { 365 size_t der_len) { 366 UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); 385 size_t der_len) { 386 if (der_len > LONG_MAX) [all...] |
ssl_cert.cc | 820 int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, size_t der_len, 822 UniquePtr<CRYPTO_BUFFER> buffer(CRYPTO_BUFFER_new(der, der_len, NULL)); 830 int SSL_use_certificate_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { 831 UniquePtr<CRYPTO_BUFFER> buffer(CRYPTO_BUFFER_new(der, der_len, NULL));
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 103 int der_len = i2d_PKCS8_PRIV_KEY_INFO(p8, &der); 104 if (der_len < 0) { 109 CBS_init(&cbs, der, (size_t)der_len); 125 size_t der_len; 128 !CBB_finish(&cbb, &der, &der_len) || 129 der_len > LONG_MAX) { 136 PKCS8_PRIV_KEY_INFO *p8 = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, (long)der_len); 137 if (p8 == NULL || p != der + der_len) { 203 size_t der_len; 209 !CBB_finish(&cbb, &der, &der_len)) { 242 size_t der_len; local 473 size_t der_len; local [all...] |
pkcs8_test.cc | 168 static void TestDecrypt(const uint8_t *der, size_t der_len, 171 bssl::UniquePtr<X509_SIG> sig(d2i_X509_SIG(NULL, &data, der_len)); 173 ASSERT_EQ(der + der_len, data);
|
/external/boringssl/src/crypto/rsa_extra/ |
rsa_asn1.c | 307 size_t der_len; local 308 if (!RSA_public_key_to_bytes(&der, &der_len, rsa)) { 311 RSA *ret = RSA_public_key_from_bytes(der, der_len); 318 size_t der_len; local 319 if (!RSA_private_key_to_bytes(&der, &der_len, rsa)) { 322 RSA *ret = RSA_private_key_from_bytes(der, der_len);
|
rsa_test.cc | 382 size_t der_len; member in struct:RSAEncryptParam 396 RSA_private_key_from_bytes(param.der, param.der_len)); 530 size_t der_len; local 531 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, key.get())); 533 key.reset(RSA_private_key_from_bytes(der, der_len)); 590 size_t der_len; local 591 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, rsa.get())); 593 EXPECT_EQ(Bytes(kKey1, sizeof(kKey1) - 1), Bytes(der, der_len)); 596 ASSERT_TRUE(RSA_public_key_to_bytes(&der, &der_len, rsa.get())); [all...] |
/external/boringssl/src/crypto/pkcs7/ |
pkcs7.c | 44 size_t der_len; local 50 if (!CBS_asn1_ber_to_der(cbs, der_bytes, &der_len)) { 54 CBS_init(&in, *der_bytes, der_len);
|
pkcs7_test.cc | [all...] |
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa_test.cc | 83 size_t der_len; local 84 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, ecdsa_sig)); 87 ECDSA_verify(0, digest, digest_len, der, der_len, eckey)); 254 size_t der_len; local 255 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, sig.get())); 258 EXPECT_EQ(der_len, ECDSA_SIG_max_len(order_len));
|
/external/boringssl/src/crypto/digest_extra/ |
digest_test.cc | 241 size_t der_len; local 242 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); 244 EXPECT_EQ(Bytes(kSHA256), Bytes(der, der_len));
|
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 123 size_t der_len; local 124 if (!ECDSA_SIG_to_bytes(&der, &der_len, s) || 125 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) {
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_cred.c | 112 size_t der_len; local 133 der = base64_decode(pos, end - pos, &der_len); 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { 270 size_t der_len; local 296 der = base64_decode(pos, end - pos, &der_len); 299 pkey = crypto_private_key_import(der, der_len, NULL); 311 size_t der_len; local 324 der = base64_decode(pos, end - pos, &der_len); 327 pkey = crypto_private_key_import(der, der_len, passwd); 1208 size_t der_len; local [all...] |
/external/boringssl/src/crypto/obj/ |
obj_test.cc | 76 static bool ExpectObj2Txt(const uint8_t *der, size_t der_len, 81 obj.length = static_cast<int>(der_len);
|
/external/boringssl/src/crypto/dh/ |
dh_test.cc | 353 size_t der_len; local 356 !CBB_finish(cbb.get(), &der, &der_len)) { 360 if (der_len != sizeof(kParams) || 361 OPENSSL_memcmp(der, kParams, der_len) != 0) { 399 !CBB_finish(cbb.get(), &der, &der_len)) { 403 if (der_len != sizeof(kParamsDSA) || 404 OPENSSL_memcmp(der, kParamsDSA, der_len) != 0) {
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 167 size_t der_len; local 170 !CBB_finish(cbb.get(), &der, &der_len)) { 180 EXPECT_EQ(Bytes(output), Bytes(der, der_len)) << "Re-encoding the key did not match.";
|
evp_extra_test.cc | 582 size_t der_len; local 585 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); 587 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); [all...] |
/external/wpa_supplicant_8/src/common/ |
dpp.c | 941 int der_len; local 964 der_len = i2d_ECPrivateKey(eckey, &der); 965 if (der_len > 0) 966 wpa_hexdump_key(MSG_DEBUG, "DPP: ECPrivateKey", der, der_len); 968 if (der_len <= 0) { 970 der_len = i2d_EC_PUBKEY(eckey, &der); 971 if (der_len > 0) 972 wpa_hexdump(MSG_DEBUG, "DPP: EC_PUBKEY", der, der_len); 1127 int der_len; local 1138 der_len = i2d_EC_PUBKEY(eckey, &der) 1163 int der_len; local 3915 int der_len; local 3929 int der_len; local 3964 int der_len; local [all...] |
/external/boringssl/src/crypto/dsa/ |
dsa.c | 786 int der_len = i2d_DSA_SIG(s, &der); local 787 if (der_len < 0 || (size_t)der_len != sig_len ||
|
/external/boringssl/src/crypto/fipsmodule/ec/ |
ec_test.cc | 121 size_t der_len; local 124 !CBB_finish(cbb.get(), &der, &der_len)) { 127 out->assign(der, der + der_len);
|
/external/boringssl/src/crypto/fipsmodule/bn/ |
bn_test.cc | 1131 size_t der_len; member in struct:ASN1Test 1148 size_t der_len; member in struct:ASN1InvalidTest 1181 size_t der_len; local [all...] |