CBS_data
*pp = CBS_data(&content);
if (!asn1_aint_keep_twos_padding(CBS_data(cbs), CBS_len(cbs))) {
*pp = CBS_data(&content);
*pp = CBS_data(&content);
*pp = CBS_data(&cbs);
*pp = CBS_data(&cbs);
CBS_init(&cbs_object, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_object_content, CBS_data(&cbs_object),
CBS_init(&cbs_exp, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_exp_content, CBS_data(&cbs_exp), CBS_len(&cbs_exp));
*in = CBS_data(&cbs);
if (!CBB_add_bytes(cbb, CBS_data(&content), CBS_len(&content)))
if (!ASN1_STRING_set(astr, CBS_data(content), CBS_len(content))) {
return pf->prim_c2i(pval, CBS_data(content), CBS_len(content),
CBS_init(&cbs_object, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_object, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_object, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_seq, CBS_data(cbs), CBS_len(cbs));
CBS_init(&cbs_seq_content, CBS_data(&cbs_seq), CBS_len(&cbs_seq));
p = CBS_data(cbs);
if (!CBS_skip(cbs, p - CBS_data(cbs)))
*out = (char *)CBS_data(&cbs);
CBS_data(&contents)[header_len - 1] == 0x80) {
CBS_init(&in_copy, CBS_data(in),
if (!CBB_add_bytes(out_contents, CBS_data(&contents),
CBS_init(&in, CBS_data(orig_in), CBS_len(orig_in));
CBS_data(&contents)[header_len - 1] == 0x80) {
CBS_init(out, CBS_data(cbs), CBS_len(cbs));
return CBS_data(cbs)[0] == tag_value;
data = CBS_data(&bytes);
boolean = CBS_data(&child2)[0];
const uint8_t *CBS_data(const CBS *cbs);
if (!SCT_set1_signature(sct, CBS_data(&signature), CBS_len(&signature)))
*in = CBS_data(&cbs);
*pp = CBS_data(&cbs);
if (!BN_bin2bn(CBS_data(&field_element), CBS_len(&field_element), bn)) {
if (!vector_decode(&pub->t[0], CBS_data(&t_bytes), kLog2Prime, rank))
memcpy(pub->rho, CBS_data(in), 32);
if (!vector_decode(priv.s, CBS_data(&s_bytes), kLog2Prime,
memcpy(priv.pub.public_key_hash, CBS_data(&cbs), 32);
memcpy(priv.fo_failure_secret, CBS_data(&cbs), 32);
CBS_data(&contents)[header_len - 1] == 0x80) {
CBS_init(&in_copy, CBS_data(in),
if (!CBB_add_bytes(out_contents, CBS_data(&contents),
CBS_init(&in, CBS_data(orig_in), CBS_len(orig_in));
CBS_data(&contents)[header_len - 1] == 0x80) {
CBS_init(out, CBS_data(cbs), CBS_len(cbs));
return CBS_data(cbs)[0] == tag_value;
data = CBS_data(&bytes);
boolean = CBS_data(&child2)[0];
const uint8_t *CBS_data(const CBS *cbs);
p = (unsigned char *)CBS_data(&header);
peer_cert_bytes = CBS_data(&peer_cert);
*pp = CBS_data(&cbs);
ERR_asprintf_error_data("offset=%d", (int)(CBS_data(&cbs) - *pp));
p = CBS_data(&cert_data);
if (p != CBS_data(&cert_data) + CBS_len(&cert_data))
if (!CBB_add_bytes(&cbb, CBS_data(¶ms), params_len))
if (EVP_DigestVerify(md_ctx, CBS_data(&signature),
q = CBS_data(&rdn);
if (q != CBS_data(&rdn) + CBS_len(&rdn)) {
if (!EVP_Digest(CBS_data(&session_ticket), CBS_len(&session_ticket),
if ((p = BN_bin2bn(CBS_data(&dh_p), CBS_len(&dh_p), NULL)) == NULL)
if ((g = BN_bin2bn(CBS_data(&dh_g), CBS_len(&dh_g), NULL)) == NULL)
if ((pub_key = BN_bin2bn(CBS_data(&dh_y), CBS_len(&dh_y),
if (EC_POINT_oct2point(group, point, CBS_data(cbs), CBS_len(cbs),
*out = (unsigned char *)CBS_data(&supported_proto);
CBS_data(&peer_proto), CBS_len(&peer_proto))) {
*out = (unsigned char *)CBS_data(&peer_proto);
ssl_msg_callback(s, is_write, content_type, CBS_data(cbs), CBS_len(cbs));
CBS_data(session_id), CBS_len(session_id), ©)) == NULL)
if (!CBB_add_bytes(&server_kex, CBS_data(¶ms),
decrypt_len = RSA_private_decrypt(CBS_len(&enc_pms), CBS_data(&enc_pms),
if (EVP_DigestVerify(mctx, CBS_data(&signature),
MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, CBS_data(&signature),
SHA_DIGEST_LENGTH, CBS_data(&signature),
p = CBS_data(&cert_data);
if (p != CBS_data(&cert_data) + CBS_len(&cert_data))
p = CBS_data(&exts);
CBS_data(&alpn), CBS_len(&alpn), s->ctx->alpn_select_cb_arg);
if (!s->tls_session_ticket_ext_cb(s, CBS_data(cbs),
if (!s->tls_session_ticket_ext_cb(s, CBS_data(cbs),
(unsigned char *)CBS_data(&extension_data),
p = CBS_data(&respid);
*data = CBS_data(&cbs);
(unsigned char *)CBS_data(&ticket_name),
(unsigned char *)CBS_data(ticket), cctx, hctx, 0)) < 0)
tctx->tlsext_tick_aes_key, CBS_data(&ticket_iv)))
if (HMAC_Update(hctx, CBS_data(&ticket_name),
if (HMAC_Update(hctx, CBS_data(&ticket_iv),
if (HMAC_Update(hctx, CBS_data(&ticket_encdata),
if (EVP_DecryptUpdate(cctx, sdec, &slen, CBS_data(&ticket_encdata),
label, label_len, CBS_data(&seed), CBS_len(&seed), NULL, 0, NULL, 0,
if (!CBB_add_bytes(out, CBS_data(seq_num),
if (!CBB_add_bytes(cbb, CBS_data(&seq_num), CBS_len(&seq_num)))
if (!EVP_AEAD_CTX_init(rp->aead_ctx, rl->aead, CBS_data(key),
if (!tls12_record_layer_set_mac_key(rp, CBS_data(mac_key),
if ((mac_pkey = EVP_PKEY_new_mac_key(mac_type, NULL, CBS_data(mac_key),
if (!EVP_CipherInit_ex(rp->cipher_ctx, rl->cipher, NULL, CBS_data(key),
CBS_data(iv), is_write))
return CBB_add_bytes(cbb, CBS_data(&seq), CBS_len(&seq));
if (!CBB_add_bytes(&cbb, CBS_data(seq_num), CBS_len(seq_num)))
if (!CBB_add_bytes(&cbb, CBS_data(seq_num),
if (!CBB_add_bytes(&cbb, CBS_data(seq_num),
return tls_content_dup_data(out, content_type, CBS_data(fragment),
rp->aead_nonce, rp->aead_nonce_len, CBS_data(fragment),
if (!EVP_Cipher(enc, content, CBS_data(fragment), CBS_len(fragment)))
p = CBS_data(&cert_data);
if (p != CBS_data(&cert_data) + CBS_len(&cert_data))
if (EVP_DigestVerify(mdctx, CBS_data(&signature), CBS_len(&signature),
return tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs));
if ((ret = tls13_write_handshake_data(rl, CBS_data(&msg->cbs),
if (!CBB_add_bytes(&fragment, CBS_data(&cbs), CBS_len(&cbs)))
if (!EVP_Digest(CBS_data(&ticket), CBS_len(&ticket),
if (!tls1_transcript_record(ctx->ssl, CBS_data(&cbs), CBS_len(&cbs)))
return tls13_clienthello_hash_update_bytes(ctx, (void *)CBS_data(cbs),
if ((ret = wire_write(CBS_data(&rec->cbs),
CBS_data(&rl->phh_cbs), CBS_len(&rl->phh_cbs))) <= 0)
tls13_record_content_type(rl->rrec), CBS_data(&cbs), CBS_len(&cbs)))
CBS_data(&enc_record), CBS_len(&enc_record),
CBS_data(&header), CBS_len(&header)))
tls_content_set_data(rl->rcontent, content_type, CBS_data(&inner),
p = CBS_data(&cert_data);
if (p != CBS_data(&cert_data) + CBS_len(&cert_data))
if (EVP_DigestVerify(mdctx, CBS_data(&signature), CBS_len(&signature),
memcpy(buf, CBS_data(&content->cbs), n);
CBS_data(&mlkem768_cbs), CBS_len(&mlkem768_cbs)))
CBS_data(&private_key), CBS_len(&private_key))) {
if (!MLKEM_decap(priv_key, CBS_data(&ciphertext), CBS_len(&ciphertext),
if (!MLKEM_parse_private_key(priv_key, CBS_data(&dk), CBS_len(&dk))) {
if (!MLKEM_decap(priv_key, CBS_data(&c), CBS_len(&c),
CBS_data(&public_key), CBS_len(&public_key))) {
if (!MLKEM_encap_external_entropy(pub_key, CBS_data(&entropy),
&encoded_public_key, &encoded_public_key_len, CBS_data(&seed))) {
if (!CBB_add_bytes(&seed_cbb, CBS_data(&d), CBS_len(&d)))
if (!CBB_add_bytes(&seed_cbb, CBS_data(&z), CBS_len(&z)))
hexdump(CBS_data(want), CBS_len(want), got);
hexdump(got, got_len, CBS_data(want));
CHECK(memcmp(CBS_data(&contents), "\x01\x02", 2) == 0);
CHECK(memcmp(CBS_data(&contents), "\x04\x01\x01", 3) == 0);
CHECK(CBS_data(&contents)[0] == 1);
CHECK(CBS_data(&data) == CBS_data(&check));
CHECK(CBS_data(&data) == CBS_data(&check) + 1);
CHECK(CBS_data(&data) == CBS_data(&check));
CHECK(CBS_data(&data) == input + 5);
CHECK(CBS_data(&data) == CBS_data(&check));
if (CBS_data(&cbs) != NULL || CBS_len(&cbs) != 0) {
hexdump(CBS_data(&cbs), CBS_len(&cbs));
hexdump(CBS_data(&cbs), CBS_len(&cbs));
hexdump(CBS_data(&cbs), CBS_len(&cbs));