/external/boringssl/src/crypto/bytestring/ |
D | asn1_compat.c | 32 size_t der_len; in CBB_finish_i2d() local 33 if (!CBB_finish(cbb, &der, &der_len)) { in CBB_finish_i2d() 37 if (der_len > INT_MAX) { in CBB_finish_i2d() 46 OPENSSL_memcpy(*outp, der, der_len); in CBB_finish_i2d() 47 *outp += der_len; in CBB_finish_i2d() 51 return (int)der_len; in CBB_finish_i2d()
|
D | bytestring_test.cc | 467 size_t der_len, const uint8_t *ber, in ExpectBerConvert() argument 479 EXPECT_EQ(Bytes(der_expected, der_len), Bytes(ber, ber_len)); in ExpectBerConvert() 481 EXPECT_NE(Bytes(der_expected, der_len), Bytes(ber, ber_len)); in ExpectBerConvert() 482 EXPECT_EQ(Bytes(der_expected, der_len), Bytes(out, out_len)); in ExpectBerConvert()
|
/external/boringssl/src/crypto/pkcs8/ |
D | pkcs8_x509.c | 104 int der_len = i2d_PKCS8_PRIV_KEY_INFO(p8, &der); variable 105 if (der_len < 0) { 110 CBS_init(&cbs, der, (size_t)der_len); 126 size_t der_len; in EVP_PKEY2PKCS8() local 129 !CBB_finish(&cbb, &der, &der_len) || in EVP_PKEY2PKCS8() 130 der_len > LONG_MAX) { in EVP_PKEY2PKCS8() 137 PKCS8_PRIV_KEY_INFO *p8 = d2i_PKCS8_PRIV_KEY_INFO(NULL, &p, (long)der_len); in EVP_PKEY2PKCS8() 138 if (p8 == NULL || p != der + der_len) { in EVP_PKEY2PKCS8() 204 size_t der_len; in PKCS8_encrypt() local 210 !CBB_finish(&cbb, &der, &der_len)) { in PKCS8_encrypt() [all …]
|
D | pkcs12_test.cc | 903 static void TestImpl(const char *name, const uint8_t *der, size_t der_len) { in TestImpl() argument 909 CBS_init(&pkcs12, der, der_len); in TestImpl() 917 static void TestCompat(const uint8_t *der, size_t der_len) { in TestCompat() argument 918 bssl::UniquePtr<BIO> bio(BIO_new_mem_buf(der, der_len)); in TestCompat()
|
D | pkcs8_test.cc | 169 static void TestDecrypt(const uint8_t *der, size_t der_len, in TestDecrypt() argument 172 bssl::UniquePtr<X509_SIG> sig(d2i_X509_SIG(NULL, &data, der_len)); in TestDecrypt() 174 ASSERT_EQ(der + der_len, data); in TestDecrypt()
|
/external/boringssl/src/crypto/pkcs7/ |
D | pkcs7_test.cc | 472 static void TestCertRepase(const uint8_t *der_bytes, size_t der_len) { in TestCertRepase() argument 481 CBS_init(&pkcs7, der_bytes, der_len); in TestCertRepase() 485 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertRepase() 501 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCertRepase() 509 static void TestCRLReparse(const uint8_t *der_bytes, size_t der_len) { in TestCRLReparse() argument 518 CBS_init(&pkcs7, der_bytes, der_len); in TestCRLReparse() 522 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCRLReparse() 538 ASSERT_TRUE(CBB_init(cbb.get(), der_len)); in TestCRLReparse()
|
D | pkcs7.c | 44 size_t der_len; in pkcs7_parse_header() local 50 if (!CBS_asn1_ber_to_der(cbs, der_bytes, &der_len)) { in pkcs7_parse_header() 54 CBS_init(&in, *der_bytes, der_len); in pkcs7_parse_header()
|
/external/boringssl/src/crypto/x509/ |
D | x509spki.c | 115 int der_len; in NETSCAPE_SPKI_b64_encode() local 116 der_len = i2d_NETSCAPE_SPKI(spki, NULL); in NETSCAPE_SPKI_b64_encode() 117 if (!EVP_EncodedLength(&b64_len, der_len)) { in NETSCAPE_SPKI_b64_encode() 121 der_spki = OPENSSL_malloc(der_len); in NETSCAPE_SPKI_b64_encode() 134 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len); in NETSCAPE_SPKI_b64_encode()
|
D | a_strex.c | 287 int outlen, der_len; in do_dump() local 300 der_len = i2d_ASN1_TYPE(&t, NULL); in do_dump() 301 der_buf = OPENSSL_malloc(der_len); in do_dump() 306 outlen = do_hex_dump(io_ch, arg, der_buf, der_len); in do_dump()
|
/external/boringssl/src/ssl/ |
D | ssl_privkey.cc | 121 int SSL_use_RSAPrivateKey_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { in SSL_use_RSAPrivateKey_ASN1() argument 122 bssl::UniquePtr<RSA> rsa(RSA_private_key_from_bytes(der, der_len)); in SSL_use_RSAPrivateKey_ASN1() 141 size_t der_len) { in SSL_use_PrivateKey_ASN1() argument 142 if (der_len > LONG_MAX) { in SSL_use_PrivateKey_ASN1() 148 EVP_PKEY *pkey = d2i_PrivateKey(type, NULL, &p, (long)der_len); in SSL_use_PrivateKey_ASN1() 149 if (pkey == NULL || p != der + der_len) { in SSL_use_PrivateKey_ASN1() 184 size_t der_len) { in SSL_CTX_use_RSAPrivateKey_ASN1() argument 185 RSA *rsa = RSA_private_key_from_bytes(der, der_len); in SSL_CTX_use_RSAPrivateKey_ASN1() 206 size_t der_len) { in SSL_CTX_use_PrivateKey_ASN1() argument 207 if (der_len > LONG_MAX) { in SSL_CTX_use_PrivateKey_ASN1() [all …]
|
D | ssl_cert.cc | 396 int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, size_t der_len, in SSL_CTX_use_certificate_ASN1() argument 398 CRYPTO_BUFFER *buffer = CRYPTO_BUFFER_new(der, der_len, NULL); in SSL_CTX_use_certificate_ASN1() 408 int SSL_use_certificate_ASN1(SSL *ssl, const uint8_t *der, size_t der_len) { in SSL_use_certificate_ASN1() argument 409 CRYPTO_BUFFER *buffer = CRYPTO_BUFFER_new(der, der_len, NULL); in SSL_use_certificate_ASN1()
|
/external/boringssl/src/crypto/rsa_extra/ |
D | rsa_test.cc | 382 size_t der_len; member 396 RSA_private_key_from_bytes(param.der, param.der_len)); in TEST_P() 530 size_t der_len; in TEST() local 531 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, key.get())); in TEST() 533 key.reset(RSA_private_key_from_bytes(der, der_len)); in TEST() 590 size_t der_len; in TEST() local 591 ASSERT_TRUE(RSA_private_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 593 EXPECT_EQ(Bytes(kKey1, sizeof(kKey1) - 1), Bytes(der, der_len)); in TEST() 596 ASSERT_TRUE(RSA_public_key_to_bytes(&der, &der_len, rsa.get())); in TEST() 600 rsa.reset(RSA_public_key_from_bytes(der, der_len)); in TEST() [all …]
|
D | rsa_asn1.c | 326 size_t der_len; in RSAPublicKey_dup() local 327 if (!RSA_public_key_to_bytes(&der, &der_len, rsa)) { in RSAPublicKey_dup() 330 RSA *ret = RSA_public_key_from_bytes(der, der_len); in RSAPublicKey_dup() 337 size_t der_len; in RSAPrivateKey_dup() local 338 if (!RSA_private_key_to_bytes(&der, &der_len, rsa)) { in RSAPrivateKey_dup() 341 RSA *ret = RSA_private_key_from_bytes(der, der_len); in RSAPrivateKey_dup()
|
/external/boringssl/src/crypto/dh/ |
D | dh_test.cc | 571 size_t der_len; in TestASN1() local 574 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 578 if (der_len != sizeof(kParams) || in TestASN1() 579 OPENSSL_memcmp(der, kParams, der_len) != 0) { in TestASN1() 617 !CBB_finish(cbb.get(), &der, &der_len)) { in TestASN1() 621 if (der_len != sizeof(kParamsDSA) || in TestASN1() 622 OPENSSL_memcmp(der, kParamsDSA, der_len) != 0) { in TestASN1()
|
/external/boringssl/src/crypto/evp/ |
D | evp_extra_test.cc | 582 size_t der_len; in TEST() local 585 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 587 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); in TEST() 605 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 607 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); in TEST() 612 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST() 614 EXPECT_EQ(Bytes(kPrivateKeyPKCS8), Bytes(der, der_len)); in TEST()
|
D | evp_test.cc | 166 size_t der_len; in ImportKey() local 169 !CBB_finish(cbb.get(), &der, &der_len)) { in ImportKey() 179 EXPECT_EQ(Bytes(output), Bytes(der, der_len)) << "Re-encoding the key did not match."; in ImportKey()
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
D | ecdsa_test.cc | 82 size_t der_len; in VerifyECDSASig() local 83 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, ecdsa_sig)); in VerifyECDSASig() 86 ECDSA_verify(0, digest, digest_len, der, der_len, eckey)); in VerifyECDSASig() 253 size_t der_len; in TEST() local 254 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, sig.get())); in TEST() 257 EXPECT_EQ(der_len, ECDSA_SIG_max_len(order_len)); in TEST()
|
/external/wpa_supplicant_8/src/tls/ |
D | tlsv1_cred.c | 112 size_t der_len; in tlsv1_add_cert() local 133 der = base64_decode(pos, end - pos, &der_len); in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 270 size_t der_len; in tlsv1_set_key_pem() local 296 der = base64_decode(pos, end - pos, &der_len); in tlsv1_set_key_pem() 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() 311 size_t der_len; in tlsv1_set_key_enc_pem() local 324 der = base64_decode(pos, end - pos, &der_len); in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 1210 size_t der_len; in tlsv1_set_dhparams_blob() local [all …]
|
/external/boringssl/src/crypto/ecdsa_extra/ |
D | ecdsa_asn1.c | 130 size_t der_len; in ECDSA_verify() local 131 if (!ECDSA_SIG_to_bytes(&der, &der_len, s) || in ECDSA_verify() 132 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { in ECDSA_verify()
|
/external/boringssl/src/crypto/obj/ |
D | obj_test.cc | 76 static bool ExpectObj2Txt(const uint8_t *der, size_t der_len, in ExpectObj2Txt() argument 81 obj.length = static_cast<int>(der_len); in ExpectObj2Txt()
|
/external/boringssl/src/crypto/fipsmodule/bn/ |
D | bn_test.cc | 978 size_t der_len; member 995 size_t der_len; member 1025 CBS_init(&cbs, reinterpret_cast<const uint8_t*>(test.der), test.der_len); in TEST_F() 1033 size_t der_len; in TEST_F() local 1036 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); in TEST_F() 1038 EXPECT_EQ(Bytes(test.der, test.der_len), Bytes(der, der_len)); in TEST_F() 1041 CBS_init(&cbs, reinterpret_cast<const uint8_t*>(test.der), test.der_len); in TEST_F() 1048 SCOPED_TRACE(Bytes(test.der, test.der_len));; in TEST_F() 1052 CBS_init(&cbs, reinterpret_cast<const uint8_t *>(test.der), test.der_len); in TEST_F() 1059 CBS_init(&cbs, reinterpret_cast<const uint8_t*>(test.der), test.der_len); in TEST_F() [all …]
|
/external/boringssl/src/crypto/fipsmodule/ec/ |
D | ec_test.cc | 120 size_t der_len; in EncodeECPrivateKey() local 123 !CBB_finish(cbb.get(), &der, &der_len)) { in EncodeECPrivateKey() 126 out->assign(der, der + der_len); in EncodeECPrivateKey()
|
/external/boringssl/src/crypto/dsa/ |
D | dsa.c | 762 int der_len = i2d_DSA_SIG(s, &der); in DSA_check_signature() local 763 if (der_len < 0 || (size_t)der_len != sig_len || in DSA_check_signature()
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 1011 OPENSSL_EXPORT int SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, size_t der_len, 1014 size_t der_len); 1018 size_t der_len); 1020 const uint8_t *der, size_t der_len); 1024 size_t der_len); 1026 size_t der_len);
|
/external/curl/lib/vtls/ |
D | vtls.c | 720 unsigned char **der, size_t *der_len) in pubkey_pem_to_der() argument 766 result = Curl_base64_decode(stripped_pem, der, der_len); in pubkey_pem_to_der()
|