/libcore/luni/src/main/java/org/apache/harmony/security/x509/ |
TBSCertificate.java | 269 TBSCertificate tbs = (TBSCertificate) object; 270 values[0] = ASN1Integer.fromIntValue(tbs.version); 271 values[1] = tbs.serialNumber.toByteArray(); 272 values[2] = tbs.signature; 273 values[3] = tbs.issuer; 274 values[4] = tbs.validity; 275 values[5] = tbs.subject; 276 values[6] = tbs.subjectPublicKeyInfo; 277 if (tbs.issuerUniqueID != null) { 278 values[7] = new BitString(tbs.issuerUniqueID) [all...] |
TBSCertList.java | 356 TBSCertList tbs = (TBSCertList) object; 357 values[0] = (tbs.version > 1) 358 ? ASN1Integer.fromIntValue(tbs.version - 1) : null; 359 values[1] = tbs.signature; 360 values[2] = tbs.issuer; 361 values[3] = tbs.thisUpdate; 362 values[4] = tbs.nextUpdate; 363 values[5] = tbs.revokedCertificates; 364 values[6] = tbs.crlExtensions;
|
/external/iproute2/tc/ |
tc_util.c | 470 struct rtattr *tbs[TCA_STATS_MAX + 1]; local 472 parse_rtattr_nested(tbs, TCA_STATS_MAX, rta); 474 if (tbs[TCA_STATS_BASIC]) { 476 memcpy(&bs, RTA_DATA(tbs[TCA_STATS_BASIC]), MIN(RTA_PAYLOAD(tbs[TCA_STATS_BASIC]), sizeof(bs))); 481 if (tbs[TCA_STATS_QUEUE]) { 483 memcpy(&q, RTA_DATA(tbs[TCA_STATS_QUEUE]), MIN(RTA_PAYLOAD(tbs[TCA_STATS_QUEUE]), sizeof(q))); 488 if (tbs[TCA_STATS_RATE_EST]) { 490 memcpy(&re, RTA_DATA(tbs[TCA_STATS_RATE_EST]), MIN(RTA_PAYLOAD(tbs[TCA_STATS_RATE_EST]), sizeof(re))) [all...] |
/external/libnl/lib/route/ |
tc.c | 92 struct nlattr *tbs[TCA_STATS_MAX + 1]; local 94 err = nla_parse_nested(tbs, TCA_STATS_MAX, tb[TCA_STATS2], 99 if (tbs[TCA_STATS_BASIC]) { 102 bs = nla_data(tbs[TCA_STATS_BASIC]); 107 if (tbs[TCA_STATS_RATE_EST]) { 110 re = nla_data(tbs[TCA_STATS_RATE_EST]); 115 if (tbs[TCA_STATS_QUEUE]) { 118 q = nla_data(tbs[TCA_STATS_QUEUE]); 128 if (tbs[TCA_STATS_APP]) { 129 g->tc_xstats = nl_data_alloc_attr(tbs[TCA_STATS_APP]) [all...] |
/external/openssl/crypto/rsa/ |
rsa_pmeth.c | 186 const unsigned char *tbs, size_t tbslen) 213 ret = FIPS_rsa_sign_digest(rsa, tbs, tbslen, rctx->md, 232 tbs, tbslen, sig, &sltmp, rsa); 242 memcpy(rctx->tbuf, tbs, tbslen); 252 tbs, tbslen, sig, &sltmp, rsa); 262 rctx->tbuf, tbs, 273 ret = RSA_private_encrypt(tbslen, tbs, sig, ctx->pkey->pkey.rsa, 341 const unsigned char *tbs, size_t tbslen) 361 tbs, tbslen, 371 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa.c | 170 const uint8_t *tbs, size_t tbslen) { 200 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { 208 !RSA_padding_add_PKCS1_PSS_mgf1(rsa, rctx->tbuf, tbs, rctx->md, 221 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); 225 size_t siglen, const uint8_t *tbs, 235 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); 241 !RSA_verify_PKCS1_PSS_mgf1(rsa, tbs, rctx->md, rctx->mgf1md, 256 CRYPTO_memcmp(tbs, rctx->tbuf, rslen) != 0) {
|
p_ec.c | 166 const uint8_t *tbs, size_t tbslen) { 185 if (!ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec)) { 193 const uint8_t *tbs, size_t tbslen) { 203 return ECDSA_verify(type, tbs, tbslen, sig, siglen, ec);
|
internal.h | 198 const unsigned char *tbs, size_t tbslen); 202 const unsigned char *tbs, size_t tbslen);
|
/external/openssl/crypto/dsa/ |
dsa_pmeth.c | 121 const unsigned char *tbs, size_t tbslen) 133 ret = DSA_sign(type, tbs, tbslen, sig, &sltmp, dsa); 143 const unsigned char *tbs, size_t tbslen) 154 ret = DSA_verify(type, tbs, tbslen, sig, siglen, dsa);
|
/external/openssl/crypto/ec/ |
ec_pmeth.c | 120 const unsigned char *tbs, size_t tbslen) 144 ret = ECDSA_sign(type, tbs, tbslen, sig, &sltmp, ec); 154 const unsigned char *tbs, size_t tbslen) 165 ret = ECDSA_verify(type, tbs, tbslen, sig, siglen, ec);
|
/external/openssl/crypto/evp/ |
pmeth_fn.c | 102 const unsigned char *tbs, size_t tbslen) 116 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 139 const unsigned char *tbs, size_t tbslen) 152 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen);
|
pmeth_lib.c | 518 const unsigned char *tbs, size_t tbslen)) 527 const unsigned char *tbs, size_t tbslen)) 537 const unsigned char *tbs, size_t tbslen))
|
evp_locl.h | 308 const unsigned char *tbs, size_t tbslen); 313 const unsigned char *tbs, size_t tbslen);
|
evp.h | [all...] |
/external/openssl/include/openssl/ |
evp.h | [all...] |
/external/qemu/ |
translate-all.c | 56 /* list of TBs intersecting this ram page */ 629 tcg_ctx.tb_ctx.tbs = 665 tb = &tcg_ctx.tb_ctx.tbs[tcg_ctx.tb_ctx.nb_tbs++]; 677 tb == &tcg_ctx.tb_ctx.tbs[tcg_ctx.tb_ctx.nb_tbs - 1]) { 1021 * Invalidate all TBs which intersect with the target physical address range 1038 * Invalidate all TBs which intersect with the target physical address range 1073 /* we remove all the TBs in the range [start, end[ */ [all...] |
/external/qemu/include/exec/ |
exec-all.h | 178 /* list of TBs jumping to this one. This is a circular list using 193 TranslationBlock *tbs; member in struct:TBContext 196 /* any access to the tbs or the page table must use this lock */
|
/libcore/support/src/test/java/tests/resources/x509/ |
create.sh | 30 openssl asn1parse -in ${DIR}/cert-rsa.der -inform d -out ${DIR}/cert-rsa-tbs.der -noout -strparse 4 102 openssl asn1parse -in ${DIR}/crl-rsa.der -inform d -out ${DIR}/crl-rsa-tbs.der -noout -strparse 4
|