/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | x509spki.c | 60 int der_len; in NETSCAPE_SPKI_b64_encode() local 62 der_len = i2d_NETSCAPE_SPKI(spki, NULL); in NETSCAPE_SPKI_b64_encode() 63 if (der_len <= 0) in NETSCAPE_SPKI_b64_encode() 65 der_spki = OPENSSL_malloc(der_len); in NETSCAPE_SPKI_b64_encode() 66 b64_str = OPENSSL_malloc(der_len * 2); in NETSCAPE_SPKI_b64_encode() 75 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len); in NETSCAPE_SPKI_b64_encode()
|
/third_party/openssl/crypto/x509/ |
H A D | x509spki.c | 60 int der_len; in NETSCAPE_SPKI_b64_encode() local 62 der_len = i2d_NETSCAPE_SPKI(spki, NULL); in NETSCAPE_SPKI_b64_encode() 63 if (der_len <= 0) in NETSCAPE_SPKI_b64_encode() 65 der_spki = OPENSSL_malloc(der_len); in NETSCAPE_SPKI_b64_encode() 66 b64_str = OPENSSL_malloc(der_len * 2); in NETSCAPE_SPKI_b64_encode() 75 EVP_EncodeBlock((unsigned char *)b64_str, der_spki, der_len); in NETSCAPE_SPKI_b64_encode()
|
/third_party/node/deps/openssl/openssl/providers/implementations/encode_decode/ |
H A D | decode_der2key.c | 183 long der_len = 0; in der2key_decode() local 203 ok = ossl_read_der(ctx->provctx, cin, &der, &der_len); in der2key_decode() 213 key = ctx->desc->d2i_PKCS8(NULL, &derp, der_len, ctx); in der2key_decode() 219 key = ctx->desc->d2i_private_key(NULL, &derp, der_len); in der2key_decode() 229 key = ctx->desc->d2i_PUBKEY(NULL, &derp, der_len); in der2key_decode() 231 key = ctx->desc->d2i_public_key(NULL, &derp, der_len); in der2key_decode() 240 key = ctx->desc->d2i_key_params(NULL, &derp, der_len); in der2key_decode() 339 static void *dh_d2i_PKCS8(void **key, const unsigned char **der, long der_len, in dh_d2i_PKCS8() argument 342 return der2key_decode_p8(der, der_len, ctx, in dh_d2i_PKCS8() 374 static void *dsa_d2i_PKCS8(void **key, const unsigned char **der, long der_len, in dsa_d2i_PKCS8() argument 399 ec_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) ec_d2i_PKCS8() argument 428 ecx_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) ecx_d2i_PKCS8() argument 486 sm2_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) sm2_d2i_PKCS8() argument 507 rsa_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) rsa_d2i_PKCS8() argument [all...] |
H A D | decode_epki2pki.c | 66 long der_len = 0; in epki2pki_decode() local 84 der_len = (long)mem->length; in epki2pki_decode() 89 if ((p8 = d2i_X509_SIG(NULL, &pder, der_len)) != NULL) { in epki2pki_decode() 112 der_len = new_der_len; in epki2pki_decode() 123 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &pder, der_len); in epki2pki_decode() 142 der, der_len); in epki2pki_decode()
|
H A D | decode_pem2der.c | 139 long der_len = 0; in pem2der_decode() local 144 &der, &der_len) > 0; in pem2der_decode() 163 || !PEM_do_header(&cipher, der, &der_len, in pem2der_decode() 198 der, der_len); in pem2der_decode()
|
/third_party/openssl/providers/implementations/encode_decode/ |
H A D | decode_der2key.c | 183 long der_len = 0; in der2key_decode() local 203 ok = ossl_read_der(ctx->provctx, cin, &der, &der_len); in der2key_decode() 213 key = ctx->desc->d2i_PKCS8(NULL, &derp, der_len, ctx); in der2key_decode() 219 key = ctx->desc->d2i_private_key(NULL, &derp, der_len); in der2key_decode() 229 key = ctx->desc->d2i_PUBKEY(NULL, &derp, der_len); in der2key_decode() 231 key = ctx->desc->d2i_public_key(NULL, &derp, der_len); in der2key_decode() 240 key = ctx->desc->d2i_key_params(NULL, &derp, der_len); in der2key_decode() 335 static void *dh_d2i_PKCS8(void **key, const unsigned char **der, long der_len, in dh_d2i_PKCS8() argument 338 return der2key_decode_p8(der, der_len, ctx, in dh_d2i_PKCS8() 370 static void *dsa_d2i_PKCS8(void **key, const unsigned char **der, long der_len, in dsa_d2i_PKCS8() argument 395 ec_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) ec_d2i_PKCS8() argument 424 ecx_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) ecx_d2i_PKCS8() argument 482 sm2_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) sm2_d2i_PKCS8() argument 503 rsa_d2i_PKCS8(void **key, const unsigned char **der, long der_len, struct der2key_ctx_st *ctx) rsa_d2i_PKCS8() argument [all...] |
H A D | decode_epki2pki.c | 66 long der_len = 0; in epki2pki_decode() local 84 der_len = (long)mem->length; in epki2pki_decode() 89 if ((p8 = d2i_X509_SIG(NULL, &pder, der_len)) != NULL) { in epki2pki_decode() 112 der_len = new_der_len; in epki2pki_decode() 123 p8inf = d2i_PKCS8_PRIV_KEY_INFO(NULL, &pder, der_len); in epki2pki_decode() 142 der, der_len); in epki2pki_decode()
|
H A D | decode_pem2der.c | 139 long der_len = 0; in pem2der_decode() local 144 &der, &der_len) > 0; in pem2der_decode() 163 || !PEM_do_header(&cipher, der, &der_len, in pem2der_decode() 198 der, der_len); in pem2der_decode()
|
/third_party/libwebsockets/lib/tls/ |
H A D | tls-jit-trust.c | 378 lws_tls_jit_trust_cert_info(const uint8_t *der, size_t der_len) in lws_tls_jit_trust_cert_info() argument 387 if (!lws_x509_parse_from_pem(x, der, der_len)) { in lws_tls_jit_trust_cert_info() 402 lwsl_hexdump_err(der, der_len); in lws_tls_jit_trust_cert_info() 418 const uint8_t *der, size_t der_len) in lws_tls_jit_trust_got_cert_cb() 467 inf->der[inf->ders] = lws_malloc(der_len, __func__); in lws_tls_jit_trust_got_cert_cb() 470 memcpy(inf->der[inf->ders], der, der_len); in lws_tls_jit_trust_got_cert_cb() 471 inf->der_len[inf->ders] = (short)der_len; in lws_tls_jit_trust_got_cert_cb() 574 info.client_ssl_ca_mem_len = (unsigned int)der_len; in lws_tls_jit_trust_got_cert_cb() 578 info.client_ssl_ca_mem_len = (unsigned int)inf->der_len[ in lws_tls_jit_trust_got_cert_cb() 416 lws_tls_jit_trust_got_cert_cb(struct lws_context *cx, void *got_opaque, const uint8_t *skid, size_t skid_len, const uint8_t *der, size_t der_len) lws_tls_jit_trust_got_cert_cb() argument [all...] |
/third_party/mbedtls/library/ |
H A D | psa_util.c | 434 unsigned char *der, size_t der_size, size_t *der_len) in mbedtls_ecdsa_raw_to_der() 478 *der_len = len; in mbedtls_ecdsa_raw_to_der() 488 * \param der_len Length of the der buffer in bytes. 506 static int convert_der_to_raw_single_int(unsigned char *der, size_t der_len, in convert_der_to_raw_single_int() argument 514 ret = mbedtls_asn1_get_tag(&p, p + der_len, &unpadded_len, in convert_der_to_raw_single_int() 552 int mbedtls_ecdsa_der_to_raw(size_t bits, const unsigned char *der, size_t der_len, in mbedtls_ecdsa_der_to_raw() argument 571 ret = mbedtls_asn1_get_tag(&p, der + der_len, &data_len, in mbedtls_ecdsa_der_to_raw() 597 if ((size_t) (p - der) != der_len) { in mbedtls_ecdsa_der_to_raw() 433 mbedtls_ecdsa_raw_to_der(size_t bits, const unsigned char *raw, size_t raw_len, unsigned char *der, size_t der_size, size_t *der_len) mbedtls_ecdsa_raw_to_der() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
H A D | sae_pk_gen.c | 20 size_t der_len; in main() local 59 der = os_readfile(argv[1], &der_len); in main() 66 key = crypto_ec_key_parse_priv((u8 *) der, der_len); in main() 134 b64 = base64_encode(der, der_len, NULL); in main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_cred.c | 112 size_t der_len; in tlsv1_add_cert() local 133 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 270 size_t der_len; in tlsv1_set_key_pem() local 296 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_set_key_pem() 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() 311 size_t der_len; in tlsv1_set_key_enc_pem() local 324 der = base64_decode((const char *) pos, end - pos, &der_len); in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 1141 size_t der_len; in tlsv1_set_dhparams_blob() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 209 int der_len; in ct_public_key_hash() local 226 der_len = i2d_X509_PUBKEY(pkey, &der); in ct_public_key_hash() 227 if (der_len <= 0) in ct_public_key_hash() 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL)) in ct_public_key_hash()
|
/third_party/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 209 int der_len; in ct_public_key_hash() local 226 der_len = i2d_X509_PUBKEY(pkey, &der); in ct_public_key_hash() 227 if (der_len <= 0) in ct_public_key_hash() 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL)) in ct_public_key_hash()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | psa_util.h | 161 * \param[out] der_len On success it contains the amount of valid data 166 unsigned char *der, size_t der_size, size_t *der_len); 172 * \param der_len Size of \p der in bytes. 181 int mbedtls_ecdsa_der_to_raw(size_t bits, const unsigned char *der, size_t der_len,
|
/third_party/libwebsockets/lib/tls/openssl/ |
H A D | openssl-x509.c | 185 int der_len = i2d_X509(x509, NULL); in lws_tls_openssl_cert_info() local 188 buf->ns.len = der_len < 0 ? 0 : der_len; in lws_tls_openssl_cert_info() 190 if (der_len < 0 || (size_t)der_len > len) in lws_tls_openssl_cert_info() 193 der_len = i2d_X509(x509, &tmp); in lws_tls_openssl_cert_info() 194 if (der_len < 0) in lws_tls_openssl_cert_info()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | sae_pk.c | 459 size_t der_len, b_len; in sae_parse_pk() local 491 der = base64_decode(pos, b_len, &der_len); in sae_parse_pk() 497 pk->key = crypto_ec_key_parse_priv(der, der_len); in sae_parse_pk() 498 bin_clear_free(der, der_len); in sae_parse_pk() 508 der = base64_decode(pos2, os_strlen(pos2), &der_len); in sae_parse_pk() 515 pk->sign_key_override = crypto_ec_key_parse_priv(der, der_len); in sae_parse_pk() 516 bin_clear_free(der, der_len); in sae_parse_pk()
|
/third_party/libwebsockets/minimal-examples/http-client/minimal-http-client-jit-trust/ |
H A D | minimal-http-client.c | 376 size_t der_len = 0; in jit_trust_query() local 390 skid_len, &der, &der_len); in jit_trust_query() 393 lwsl_info("%s: found len %d\n", __func__, (int)der_len); in jit_trust_query() 400 der, der_len); in jit_trust_query()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_cred.c | 112 size_t der_len; in tlsv1_add_cert() local 133 der = base64_decode(pos, end - pos, &der_len); in tlsv1_add_cert() 140 if (tlsv1_add_cert_der(chain, der, der_len) < 0) { in tlsv1_add_cert() 270 size_t der_len; in tlsv1_set_key_pem() local 296 der = base64_decode(pos, end - pos, &der_len); in tlsv1_set_key_pem() 299 pkey = crypto_private_key_import(der, der_len, NULL); in tlsv1_set_key_pem() 311 size_t der_len; in tlsv1_set_key_enc_pem() local 324 der = base64_decode(pos, end - pos, &der_len); in tlsv1_set_key_enc_pem() 327 pkey = crypto_private_key_import(der, der_len, passwd); in tlsv1_set_key_enc_pem() 1208 size_t der_len; in tlsv1_set_dhparams_blob() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | a_strex.c | 269 int outlen, der_len; in do_dump() local 282 der_len = i2d_ASN1_TYPE(&t, NULL); in do_dump() 283 if (der_len <= 0) in do_dump() 285 if ((der_buf = OPENSSL_malloc(der_len)) == NULL) { in do_dump() 291 outlen = do_hex_dump(io_ch, arg, der_buf, der_len); in do_dump()
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | x942kdf.c | 188 * |der_len| is the returned size of the encoded data. 194 * Assumptions: |der|, |der_len| & |out_ctr| are not NULL. 204 unsigned char **der, size_t *der_len, in x942_encode_otherinfo() 257 *der_len = der_buflen; in x942_encode_otherinfo() 405 size_t der_len = 0; in x942kdf_derive() local 459 &der, &der_len, &ctr)) { in x942kdf_derive() 464 der, der_len, ctr, key, keylen); in x942kdf_derive() 197 x942_encode_otherinfo(size_t keylen, const unsigned char *cek_oid, size_t cek_oid_len, const unsigned char *acvp, size_t acvp_len, const unsigned char *partyu, size_t partyu_len, const unsigned char *partyv, size_t partyv_len, const unsigned char *supp_pub, size_t supp_pub_len, const unsigned char *supp_priv, size_t supp_priv_len, unsigned char **der, size_t *der_len, unsigned char **out_ctr) x942_encode_otherinfo() argument
|
/third_party/node/deps/openssl/openssl/crypto/store/ |
H A D | store_result.c | 312 long der_len = (long)data->octet_data_size; in try_key_value_legacy() local 318 pk = d2i_PUBKEY_ex(NULL, &derp, der_len, libctx, propq); in try_key_value_legacy() 334 p8 = d2i_X509_SIG(NULL, &derp, der_len); in try_key_value_legacy() 356 der_len = len; in try_key_value_legacy() 369 p8info = d2i_PKCS8_PRIV_KEY_INFO(NULL, &derp, der_len); in try_key_value_legacy()
|
/third_party/openssl/crypto/asn1/ |
H A D | a_strex.c | 270 int outlen, der_len; in do_dump() local 283 der_len = i2d_ASN1_TYPE(&t, NULL); in do_dump() 284 if (der_len <= 0) in do_dump() 286 if ((der_buf = OPENSSL_malloc(der_len)) == NULL) { in do_dump() 292 outlen = do_hex_dump(io_ch, arg, der_buf, der_len); in do_dump()
|
/third_party/openssl/crypto/store/ |
H A D | store_result.c | 312 long der_len = (long)data->octet_data_size; in try_key_value_legacy() local 318 pk = d2i_PUBKEY_ex(NULL, &derp, der_len, libctx, propq); in try_key_value_legacy() 334 p8 = d2i_X509_SIG(NULL, &derp, der_len); in try_key_value_legacy() 356 der_len = len; in try_key_value_legacy() 369 p8info = d2i_PKCS8_PRIV_KEY_INFO(NULL, &derp, der_len); in try_key_value_legacy()
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | x942kdf.c | 188 * |der_len| is the returned size of the encoded data. 194 * Assumptions: |der|, |der_len| & |out_ctr| are not NULL. 204 unsigned char **der, size_t *der_len, in x942_encode_otherinfo() 257 *der_len = der_buflen; in x942_encode_otherinfo() 405 size_t der_len = 0; in x942kdf_derive() local 459 &der, &der_len, &ctr)) { in x942kdf_derive() 464 der, der_len, ctr, key, keylen); in x942kdf_derive() 197 x942_encode_otherinfo(size_t keylen, const unsigned char *cek_oid, size_t cek_oid_len, const unsigned char *acvp, size_t acvp_len, const unsigned char *partyu, size_t partyu_len, const unsigned char *partyv, size_t partyv_len, const unsigned char *supp_pub, size_t supp_pub_len, const unsigned char *supp_priv, size_t supp_priv_len, unsigned char **der, size_t *der_len, unsigned char **out_ctr) x942_encode_otherinfo() argument
|