/external/boringssl/src/crypto/bytestring/ |
asn1_compat.c | 31 uint8_t *der; local 33 if (!CBB_finish(cbb, &der, &der_len)) { 38 OPENSSL_free(der); 43 *outp = der; 44 der = NULL; 46 OPENSSL_memcpy(*outp, der, der_len); 50 OPENSSL_free(der);
|
/external/honggfuzz/examples/openssl/ |
x509.c | 30 unsigned char* der = NULL; local 31 i2d_X509(x, &der); 32 OPENSSL_free(der);
|
/packages/apps/SecureElement/src/com/android/se/security/arf/PKCS15/ |
EFDIR.java | 72 DERParser der = new DERParser(buffer); local 73 der.parseTLV(ASN1.TAG_ApplTemplate); 75 der.parseTLV(ASN1.TAG_ApplIdentifier); 76 if (!Arrays.equals(der.getTLVData(), aid)) return null; // Record for another AID 79 byte objectType = der.parseTLV(); 82 der.getTLVData(); 83 der.parseTLV(ASN1.TAG_ApplPath); 88 return der.getTLVData();
|
EFDODF.java | 73 DERParser der = new DERParser(buffer); local 75 while (!der.isEndofBuffer()) { 76 if (der.parseTLV() == (byte) 0xA1) { // OidDO Data Object 78 der.parseTLV(ASN1.TAG_Sequence); 79 der.skipTLVData(); 81 der.parseTLV(ASN1.TAG_Sequence); 82 der.skipTLVData(); 84 objectType = der.parseTLV(); 86 der.skipTLVData(); 87 objectType = der.parseTLV() [all...] |
EFODF.java | 76 DERParser der = new DERParser(buffer); local 77 while (!der.isEndofBuffer()) { 78 if (der.parseTLV() == (byte) 0xA5) { // CDF 79 mCDFPath = der.parsePathAttributes(); 85 der.skipTLVData();
|
EFACMain.java | 80 DERParser der = new DERParser(buffer); local 81 der.parseTLV(ASN1.TAG_Sequence); 82 if (der.parseTLV(ASN1.TAG_OctetString) != REFRESHTAG_LEN) { 86 byte[] refreshTag = der.getTLVData(); 89 return der.parsePathAttributes();
|
EF.java | 118 DERParser der = new DERParser(data); local 120 der.parseTLV(ASN1.TAG_FCP); 121 while (!der.isEndofBuffer()) { 122 switch (der.parseTLV()) { 124 buffer = der.getTLVData(); 130 buffer = der.getTLVData(); 155 der.skipTLVData();
|
EFACRules.java | 81 DERParser der = new DERParser(buffer); local 86 while (!der.isEndofBuffer()) { 87 der.parseTLV(ASN1.TAG_Sequence); 88 switch (der.parseTLV()) { 90 der.parseTLV(ASN1.TAG_OctetString); 91 aid = der.getTLVData(); 105 byte[] path = der.parsePathAttributes();
|
/external/libchrome/crypto/ |
rsa_private_key.cc | 86 uint8_t *der; local 91 !CBB_finish(cbb.get(), &der, &der_len)) { 94 output->assign(der, der + der_len); 95 OPENSSL_free(der); 101 uint8_t *der; local 106 !CBB_finish(cbb.get(), &der, &der_len)) { 109 output->assign(der, der + der_len); 110 OPENSSL_free(der); [all...] |
/external/clang/test/SemaCXX/ |
microsoft-new-delete.cpp | 24 struct derived : private base {} der; // expected-note {{here}} variable in typeref:struct:derived 27 void *s = new (der) int[4]; // expected-error {{private}}
|
/external/boringssl/src/crypto/dh/ |
dh_test.cc | 352 uint8_t *der; local 356 !CBB_finish(cbb.get(), &der, &der_len)) { 359 bssl::UniquePtr<uint8_t> free_der(der); 361 OPENSSL_memcmp(der, kParams, der_len) != 0) { 399 !CBB_finish(cbb.get(), &der, &der_len)) { 402 bssl::UniquePtr<uint8_t> free_der2(der); 404 OPENSSL_memcmp(der, kParamsDSA, der_len) != 0) {
|
/external/boringssl/src/crypto/ecdsa_extra/ |
ecdsa_asn1.c | 114 uint8_t *der = NULL; local 122 // Defend against potential laxness in the DER parser. 124 if (!ECDSA_SIG_to_bytes(&der, &der_len, s) || 125 der_len != sig_len || OPENSSL_memcmp(sig, der, sig_len) != 0) { 126 // This should never happen. crypto/bytestring is strictly DER. 134 OPENSSL_free(der); 216 // in DER.
|
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 166 uint8_t *der; local 170 !CBB_finish(cbb.get(), &der, &der_len)) { 173 bssl::UniquePtr<uint8_t> free_der(der); 180 EXPECT_EQ(Bytes(output), Bytes(der, der_len)) << "Re-encoding the key did not match.";
|
evp_extra_test.cc | 36 // kExampleRSAKeyDER is an RSA private key in ASN.1, DER format. Of course, you 581 uint8_t *der; local 585 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); 586 bssl::UniquePtr<uint8_t> free_der(der); 587 EXPECT_EQ(Bytes(kPublicKeySPKI), Bytes(der, der_len)); [all...] |
/external/boringssl/src/crypto/rsa_extra/ |
rsa_asn1.c | 306 uint8_t *der; local 308 if (!RSA_public_key_to_bytes(&der, &der_len, rsa)) { 311 RSA *ret = RSA_public_key_from_bytes(der, der_len); 312 OPENSSL_free(der); 317 uint8_t *der; local 319 if (!RSA_private_key_to_bytes(&der, &der_len, rsa)) { 322 RSA *ret = RSA_private_key_from_bytes(der, der_len); 323 OPENSSL_free(der);
|
/external/libcxx/test/libcxx/utilities/function.objects/func.require/ |
bullet_4_5_6.pass.cpp | 68 Derived der; local 69 Derived* der_ptr = &der; 73 std::reference_wrapper<Derived> drref(der); 80 runTestDispatch<E>(M, der, &der.object); 95 runTestDispatch<E>(M, der, &der.object); 110 runTestDispatch<E>(M, der, &der.object); 125 runTestDispatch<E>(M, der, &der.object) [all...] |
bullet_7.pass.cpp | 179 D der; local 181 t.runTest(der);
|
bullet_1_2_3.pass.cpp | 154 D der; local 155 D* der_ptr = &der; 159 std::reference_wrapper<D> drref(der); 165 runTestDispatch(tag, der);
|
/libcore/ojluni/src/main/java/javax/security/auth/x500/ |
X500Principal.java | 41 * of the distinguished name, or by using the ASN.1 DER encoded byte 192 * ASN.1 DER encoded form. The ASN.1 notation for this structure is as 220 * DER encoded form 237 * containing the distinguished name in ASN.1 DER encoded form. 246 * name in ASN.1 DER encoded form 261 DerValue der = new DerValue(is); local 262 thisX500Name = new X500Name(der.data); 421 * Returns the distinguished name in ASN.1 DER encoded form. The ASN.1 428 * @return a byte array containing the distinguished name in ASN.1 DER 494 * by writing out its DER-encoded for [all...] |
/prebuilts/ndk/r16/sources/cxx-stl/llvm-libc++/test/libcxx/utilities/function.objects/func.require/ |
bullet_4_5_6.pass.cpp | 68 Derived der; local 69 Derived* der_ptr = &der; 73 std::reference_wrapper<Derived> drref(der); 80 runTestDispatch<E>(M, der, &der.object); 95 runTestDispatch<E>(M, der, &der.object); 110 runTestDispatch<E>(M, der, &der.object); 125 runTestDispatch<E>(M, der, &der.object) [all...] |
bullet_7.pass.cpp | 179 D der; local 181 t.runTest(der);
|
/tools/tradefederation/core/tests/src/com/android/tradefed/device/ |
ManagedDeviceListTest.java | 142 DeviceEventResponse der = new DeviceEventResponse(DeviceAllocationState.Unknown, true); local 143 EasyMock.expect(mockDevice.handleAllocationEvent(DeviceEvent.DISCONNECTED)).andReturn(der);
|
/external/boringssl/src/crypto/digest_extra/ |
digest_test.cc | 240 uint8_t *der; local 242 ASSERT_TRUE(CBB_finish(cbb.get(), &der, &der_len)); 243 bssl::UniquePtr<uint8_t> free_der(der); 244 EXPECT_EQ(Bytes(kSHA256), Bytes(der, der_len));
|
/external/boringssl/src/crypto/fipsmodule/ec/ |
ec_test.cc | 120 uint8_t *der; local 124 !CBB_finish(cbb.get(), &der, &der_len)) { 127 out->assign(der, der + der_len); 128 OPENSSL_free(der);
|
/external/boringssl/src/crypto/fipsmodule/ecdsa/ |
ecdsa_test.cc | 82 uint8_t *der; local 84 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, ecdsa_sig)); 85 bssl::UniquePtr<uint8_t> delete_der(der); 87 ECDSA_verify(0, digest, digest_len, der, der_len, eckey)); 253 uint8_t *der; local 255 ASSERT_TRUE(ECDSA_SIG_to_bytes(&der, &der_len, sig.get())); 256 OPENSSL_free(der);
|