• Home
  • Raw
  • Download

Lines Matching +full:x86 +full:- +full:openssl

4  *  Use of this source code is governed by a BSD-style license
16 // Must be included first before openssl headers.
20 #include <openssl/asn1.h>
21 #include <openssl/bytestring.h>
22 #include <openssl/digest.h>
23 #include <openssl/evp.h>
24 #include <openssl/mem.h>
25 #include <openssl/pool.h>
26 #include <openssl/rand.h>
46 // Taken from openssl/nid.h.
48 static const uint8_t kMD5WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
50 static const uint8_t kECDSAWithSHA1[] = {0x2a, 0x86, 0x48, 0xce,
52 static const uint8_t kDSAWithSHA1[] = {0x2a, 0x86, 0x48, 0xce,
56 static const uint8_t kSHA1WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
58 static const uint8_t kECDSAWithSHA224[] = {0x2a, 0x86, 0x48, 0xce,
60 static const uint8_t kSHA224WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
62 static const uint8_t kDSAWithSHA224[] = {0x60, 0x86, 0x48, 0x01, 0x65,
64 static const uint8_t kECDSAWithSHA256[] = {0x2a, 0x86, 0x48, 0xce,
66 static const uint8_t kSHA256WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
68 static const uint8_t kDSAWithSHA256[] = {0x60, 0x86, 0x48, 0x01, 0x65,
70 static const uint8_t kECDSAWithSHA384[] = {0x2a, 0x86, 0x48, 0xce,
72 static const uint8_t kSHA384WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
74 static const uint8_t kECDSAWithSHA512[] = {0x2a, 0x86, 0x48, 0xce,
76 static const uint8_t kSHA512WithRSAEncryption[] = {0x2a, 0x86, 0x48, 0x86, 0xf7,
85 << cert->ToPEMString(); in PrintCert()
163 switch (asn1_time->type) { in AddTime()
176 !CBB_add_bytes(&child, asn1_time->data, asn1_time->length) || in AddTime()
184 // Generate a self-signed certificate, with the public key from the
247 CRYPTO_BUFFER_new(cert_bytes, cert_len, openssl::GetBufferPool())); in MakeCertificate()
267 MakeCertificate(key_pair->pkey(), actual_params); in Generate()
269 openssl::LogSSLErrors("Generating certificate"); in Generate()
287 der.length(), openssl::GetBufferPool())); in FromPEMString()
301 if (!openssl::ParseCertificate(cert_buffer_.get(), &oid, nullptr)) { in GetSignatureDigestAlgorithm()
341 algorithm->clear(); in GetSignatureDigestAlgorithm()
387 der_buffer->SetData(CRYPTO_BUFFER_data(cert_buffer_.get()), in ToDER()
405 if (!openssl::ParseCertificate(cert_buffer_.get(), nullptr, &ret)) { in CertificateExpirationTime()
407 return -1; in CertificateExpirationTime()