/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JCEECPrivateKey.java | 205 ASN1ObjectIdentifier oid = ASN1ObjectIdentifier.getInstance(params.getParameters()); local 206 X9ECParameters ecP = ECUtil.getNamedCurveByOid(oid); 211 // ECDomainParameters gParam = ECGOST3410NamedCurves.getByOID(oid); 215 // ECGOST3410NamedCurves.getName(oid), 229 ECUtil.getCurveName(oid), 300 if (curveOid == null) // guess it's the OID 394 ASN1ObjectIdentifier oid, 397 attrCarrier.setBagAttribute(oid, attribute); 401 ASN1ObjectIdentifier oid) 403 return attrCarrier.getBagAttribute(oid); [all...] |
JCEECPublicKey.java | 249 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)params.getParameters(); local 250 X9ECParameters ecP = ECUtil.getNamedCurveByOid(oid); 256 ECUtil.getCurveName(oid),
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 162 * Set the signature algorithm. This can be either a name or an OID, names 227 String oid, 231 this.addExtension(new DERObjectIdentifier(oid), critical, value); 238 DERObjectIdentifier oid, 242 extGenerator.addExtension(new ASN1ObjectIdentifier(oid.getId()), critical, value); 251 String oid, 255 this.addExtension(new DERObjectIdentifier(oid), critical, value); 262 DERObjectIdentifier oid, 266 extGenerator.addExtension(new ASN1ObjectIdentifier(oid.getId()), critical, value); 275 String oid, [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nv50/ |
nv50_shader_state.c | 314 uint8_t mv = out->mask, mf = in->mask, oid = out->hw; local 321 map[mid] = oid; 328 oid += mv & 1; 497 uint8_t oid = 0, mv = 0, mg = gp->in[i].mask; local 503 oid = vp->out[j].hw; 510 map[m++] = oid; 514 oid += mv & 1;
|
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/ |
nfc_hal_prm.c | 92 UINT8 hcit, oid, hdr0, type; local 109 STREAM_TO_UINT8 (oid, p_src); 119 if ( (oid == NCI_MSG_SECURE_PATCH_DOWNLOAD ) 125 else if ( (oid == NCI_MSG_SECURE_PATCH_DOWNLOAD ) [all...] |
/external/mesa3d/src/gallium/drivers/nv50/ |
nv50_shader_state.c | 314 uint8_t mv = out->mask, mf = in->mask, oid = out->hw; local 321 map[mid] = oid; 328 oid += mv & 1; 497 uint8_t oid = 0, mv = 0, mg = gp->in[i].mask; local 503 oid = vp->out[j].hw; 510 map[m++] = oid; 514 oid += mv & 1;
|
/external/wpa_supplicant_8/src/tls/ |
asn1.h | 54 unsigned long oid[ASN1_MAX_OID_LEN]; member in struct:asn1_oid 60 int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid); 61 int asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid, 63 void asn1_oid_to_str(struct asn1_oid *oid, char *buf, size_t len);
|
x509v3.h | 15 struct asn1_oid oid; member in struct:x509_algorithm_identifier
|
x509v3.c | 210 if (asn1_get_oid(pos, end - pos, &id->oid, &pos)) 297 struct asn1_oid oid; local 356 if (asn1_get_oid(seq_pos, seq_end - seq_pos, &oid, &seq_pos)) { 378 if (oid.len == 4 && 379 oid.oid[0] == 2 && oid.oid[1] == 5 && oid.oid[2] == 4) 1111 struct asn1_oid oid; local 1588 struct asn1_oid oid; local [all...] |
/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
Extensions.java | 71 // map containing the oid of extensions as a keys and 139 String oid = extension.getExtnID(); local 141 if (!SUPPORTED_CRITICAL.contains(oid)) { 144 localCritical.add(oid); 146 localNoncritical.add(oid); 157 public Extension getExtensionByOID(String oid) { 169 return localOidMap.get(oid); 174 * Returns the value of Key Usage extension (OID == 2.5.29.15). 209 * Returns the value of Extended Key Usage extension (OID == 2.5.29.37). 234 * Returns the value of Basic Constraints Extension (OID = 2.5.29.19) [all...] |
/libcore/luni/src/test/java/tests/security/cert/ |
X509CRL2Test.java | 91 String oid = i.next(); local 92 byte[] value = pemCert.getExtensionValue(oid); 95 assertTrue("The extension value for the oid " + oid 207 public byte[] getExtensionValue(String oid) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
X509Name.java | 224 * default look up table translating OID values into their common symbols following 230 * look up table translating OID values into their common symbols following the convention in RFC 2253 236 * look up table translating OID values into their common symbols following the convention in RFC 1779 247 * look up table translating OID values into their common symbols 402 * the principal will be a list of constructed sets, each containing an (OID, String) pair. 461 * it's is assumed the table contains OID/String pairs, and the contents 479 * it's is assumed the table contains OID/String pairs, and the contents 494 * it's is assumed the table contains OID/String pairs, and the contents 531 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)this.ordering.elementAt(i); local 533 if (attributes.get(oid) == null 681 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)lookUp.get(Strings.toLowerCase(name)); local 844 String value;ASN1ObjectIdentifier oid; local 934 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)ordering.elementAt(i); local 1014 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)ordering.elementAt(i); local 1119 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)ordering.elementAt(i); local [all...] |
X509Extensions.java | 249 * the extensions are a list of constructed sequences, either with (OID, OctetString) or (OID, Boolean, OctetString) 280 * it's is assumed the table contains OID/String pairs. 291 * It's is assumed the table contains OID/String pairs. 318 ASN1ObjectIdentifier oid = ASN1ObjectIdentifier.getInstance(e.nextElement()); local 319 X509Extension ext = (X509Extension)extensions.get(oid); 321 this.extensions.put(oid, ext); 349 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 352 this.extensions.put(oid, ext); 372 DERObjectIdentifier oid) 405 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 468 Object oid = ordering.elementAt(i); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x500/style/ |
IETFUtils.java | 151 ASN1ObjectIdentifier oid = x500Style.attrNameToOID(attr.trim()); local 158 oids.addElement(oid); 173 oid = x500Style.attrNameToOID(attr.trim()); 176 oids.addElement(oid); 184 builder.addRDN(oid, unescape(value)); 199 ASN1ObjectIdentifier oid = x500Style.attrNameToOID(attr.trim()); local 201 builder.addRDN(oid, unescape(value)); 233 ASN1ObjectIdentifier oid, 239 if (oid.equals(en.nextElement())) 251 if (oid.equals(lookup.get(key)) 273 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)lookUp.get(Strings.toLowerCase(name)); local [all...] |
/external/chromium_org/content/browser/geolocation/ |
wifi_data_provider_win.cc | 42 // The limits on the size of the buffer used for the OID query. 150 // Makes the OID query and returns a Win32 error code. 586 DWORD oid = OID_802_11_BSSID_LIST; local 589 &oid, 590 sizeof(oid),
|
/external/chromium_org/net/cert/ |
ct_objects_extractor_nss.cc | 64 // The wire form of the OID 1.3.6.1.4.1.11129.2.4.2. See Section 3.3 of 72 // The wire form of the OID 1.3.6.1.4.1.11129.2.4.5 - OCSP SingleExtension for 109 SECOidTag RegisterOid(const unsigned char* oid, 113 oid_data.oid.len = oid_len; 114 oid_data.oid.data = const_cast<unsigned char*>(oid); 138 // Obtains the data for an X.509v3 certificate extension identified by |oid| 143 SECOidTag oid, 146 SECStatus rv = CERT_FindCertExtension(cert, oid, &extension); 207 // removing the X.509 extension with OID 1.3.6.1.4.1.11129.2.4.2 (that is 211 SECOidData* oid = SECOID_FindOIDByTag(g_ct_singleton.Get().embedded_oid()); local [all...] |
/external/dropbear/libtomcrypt/testprof/ |
der_tests.c | 120 OID { 1, 2, 840, 113549 } 374 /* OID STRING */ 513 unsigned long x, y, z, zz, oid[2][32]; local 647 /* test OID */ 657 y = sizeof(oid[0])/sizeof(oid[0][0]); 658 DO(der_decode_object_identifier(buf[0], x, oid[0], &y)); 659 if (y != sizeof(rsa_oid)/sizeof(rsa_oid[0]) || memcmp(rsa_oid, oid[0], sizeof(rsa_oid))) { 661 for (z = 0; z < y; z++) fprintf(stderr, "%lu ", oid[0][z]); 671 z = 2 + (z % ((sizeof(oid[0])/sizeof(oid[0][0])) - 2)) [all...] |
/frameworks/base/core/java/android/net/http/ |
SslCertificate.java | 382 Vector oid = x509Name.getOIDs(); local 384 for (int i = 0; i < oid.size(); i++) { 385 if (oid.elementAt(i).equals(X509Name.CN)) { 392 if (oid.elementAt(i).equals(X509Name.O)) { 399 if (oid.elementAt(i).equals(X509Name.OU)) {
|
/external/chromium_org/chrome/third_party/mozilla_security_manager/ |
nsNSSCertHelper.cpp | 86 od.oid.type = siDEROID; 87 od.oid.data = buffer; 88 od.oid.len = sizeof(buffer); 90 if (SEC_StringToOID(NULL, &od.oid, oid_string, 0) == SECSuccess) { 169 std::string DumpOidString(SECItem* oid) { 170 char* pr_string = CERT_GetOidString(oid); 177 return ProcessRawBytes(oid); 180 std::string GetOIDText(SECItem* oid) { 182 SECOidTag oid_tag = SECOID_FindOIDTag(oid); 396 return DumpOidString(oid); 958 SECItem* oid; local [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3ecc.c | 70 /* Table containing OID tags for elliptic curves named in the 186 SECITEM_AllocItem(arena, params, (2 + oidData->oid.len)); 188 * params->data needs to contain the ASN encoding of an object ID (OID) 189 * representing the named curve. The actual OID is in 190 * oidData->oid.data so we simply prepend 0x06 and OID length 193 params->data[1] = oidData->oid.len; 194 memcpy(params->data + 2, oidData->oid.data, oidData->oid.len); 202 SECItem oid = { siBuffer, NULL, 0} local [all...] |
/external/libnfc-nci/src/nfc/nfc/ |
nfc_ncif.c | 369 UINT8 oid; local 387 oid = ((*pp) & NCI_OID_MASK); 392 if ((old_gid != gid) || (old_oid != oid)) 394 NFC_TRACE_ERROR2 ("nfc_ncif_process_event unexpected rsp: gid:0x%x, oid:0x%x", gid, oid); [all...] |
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLX509Certificate.java | 178 public byte[] getExtensionValue(String oid) { 179 return NativeCrypto.X509_get_ext_oid(mContext, oid); 403 String oid = NativeCrypto.get_X509_pubkey_oid(mContext); local 406 KeyFactory kf = KeyFactory.getInstance(oid); 416 return new X509PublicKey(oid, encoded);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 1060 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)sq.getObjectAt(0); local 1235 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 1324 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 1398 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 1466 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local [all...] |
/external/libmtp/src/ |
ptp-pack.c | 1830 uint32_t oid = dtoh32a(cur + ptp_canon_dir_objectid); local [all...] |
/external/tcpdump/ |
print-snmp.c | 256 * A structure for the OID tree for the compiled-in MIB. 261 u_char oid; /* sub-id following parent */ member in struct:obj 284 const char *oid; /* ASN.1 encoded OID */ member in struct:obj_abrev 306 * This is used in the OID print routine to walk down the object tree 313 if ((o) == objp->oid) \ 688 size_t a_len = strlen(a->oid); 691 if (memcmp(a->oid, (char *)p, a_len) == 0) { 693 i -= strlen(a->oid); 694 p += strlen(a->oid); 1029 unsigned int oid[128], oidlen; local 1059 unsigned int i, oid[128], oidlen; local [all...] |