/device/linaro/bootloader/arm-trusted-firmware/plat/arm/board/fvp/ |
fvp_trusted_boot.c | 24 const char *oid; local 29 oid = (const char *)cookie; 30 if (strcmp(oid, TRUSTED_FW_NVCOUNTER_OID) == 0) { 32 } else if (strcmp(oid, NON_TRUSTED_FW_NVCOUNTER_OID) == 0) {
|
/external/javassist/src/main/javassist/tools/rmi/ |
RemoteRef.java | 23 public int oid; field in class:RemoteRef 27 oid = i; 32 oid = i;
|
/bootable/recovery/tests/unit/ |
asn1_decoder_test.cpp | 60 const uint8_t* oid; local 62 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)); 71 const uint8_t* oid; local 73 ASSERT_TRUE(ptr->asn1_oid_get(&oid, &length)); 75 ASSERT_EQ(0x01U, *oid); 88 const uint8_t* oid; local 90 ASSERT_TRUE(ctx.asn1_oid_get(&oid, &length)); 92 ASSERT_EQ(0xA5U, *oid); 106 const uint8_t* oid; local 108 ASSERT_FALSE(ptr->asn1_oid_get(&oid, &length)) 116 const uint8_t* oid; local 134 const uint8_t* oid; local 144 const uint8_t* oid; local 154 const uint8_t* oid; local 162 const uint8_t* oid; local 170 const uint8_t* oid; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ |
OIDTokenizer.java | 4 * Class for breaking up an OID into it's component tokens, ala 11 private String oid; field in class:OIDTokenizer 17 * @param oid the string representation of the OID. 20 String oid) 22 this.oid = oid; 49 int end = oid.indexOf('.', index); 53 token = oid.substring(index); 58 token = oid.substring(index, end) [all...] |
/external/boringssl/src/crypto/pkcs8/ |
internal.h | 88 uint8_t oid[10]; member in struct:pbe_suite
|
/external/libcups/cups/ |
testsnmp.c | 45 char *oid = NULL; /* Last OID shown */ local 101 oid = argv[i]; 106 if (!oid) 127 char temp[1024]; /* Temporary OID string */ 160 printf("OID %s\n", _cupsSNMPOIDToString(packet->object_value.oid, 196 * 'show_oid()' - Show the specified OID. 203 const char *s, /* I - OID to query */ 207 int oid[CUPS_SNMP_MAX_OID]; /* OID * local [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs8.c | 24 struct asn1_oid oid; local 81 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &pos)) { 82 wpa_printf(MSG_DEBUG, "PKCS #8: Failed to parse OID " 87 asn1_oid_to_str(&oid, obuf, sizeof(obuf)); 90 if (oid.len != 7 || 91 oid.oid[0] != 1 /* iso */ || 92 oid.oid[1] != 2 /* member-body */ || 93 oid.oid[2] != 840 /* us */ | [all...] |
pkcs1.c | 206 struct asn1_oid oid; local 266 if (asn1_get_oid(hdr.payload, hdr.length, &oid, &next)) { 273 if (!asn1_oid_equal(&oid, hash_alg)) { 275 asn1_oid_to_str(&oid, txt, sizeof(txt)); 278 "PKCS #1: Hash alg OID mismatch: was %s, expected %s",
|
/libcore/ojluni/src/main/java/sun/security/x509/ |
OIDName.java | 43 private ObjectIdentifier oid; field in class:OIDName 52 oid = derValue.getOID(); 60 public OIDName(ObjectIdentifier oid) { 61 this.oid = oid; 65 * Create the OIDName from the String form of the OID 72 oid = new ObjectIdentifier(name); 86 * Encode the OID name into the DerOutputStream. 92 out.putOID(oid); 99 return ("OIDName: " + oid.toString()) [all...] |
/device/linaro/bootloader/arm-trusted-firmware/plat/arm/board/common/ |
board_arm_trusted_boot.c | 143 * will contain the OID of the counter in the certificate. 149 const char *oid; local 155 oid = (const char *)cookie; 156 if (strcmp(oid, TRUSTED_FW_NVCOUNTER_OID) == 0) { 158 } else if (strcmp(oid, NON_TRUSTED_FW_NVCOUNTER_OID) == 0) { 250 * specifies the OID of the counter in the certificate. 270 * Store a new non-volatile counter value in the counter specified by the OID
|
/external/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 71 CBB spki, algorithm, oid, null, key_bitstring; local 74 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 75 !CBB_add_bytes(&oid, rsa_asn1_meth.oid, rsa_asn1_meth.oid_len) || 117 CBB pkcs8, algorithm, oid, null, private_key; local 121 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 122 !CBB_add_bytes(&oid, rsa_asn1_meth.oid, rsa_asn1_meth.oid_len) ||
|
evp_asn1.c | 79 CBS oid; local 80 if (!CBS_get_asn1(cbs, &oid, CBS_ASN1_OBJECT)) { 86 if (CBS_len(&oid) == method->oid_len && 87 OPENSSL_memcmp(CBS_data(&oid), method->oid, method->oid_len) == 0) {
|
p_dsa_asn1.c | 109 CBB spki, algorithm, oid, key_bitstring; local 112 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 113 !CBB_add_bytes(&oid, dsa_asn1_meth.oid, dsa_asn1_meth.oid_len) || 177 CBB pkcs8, algorithm, oid, private_key; local 181 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 182 !CBB_add_bytes(&oid, dsa_asn1_meth.oid, dsa_asn1_meth.oid_len) ||
|
p_ed25519_asn1.c | 76 CBB spki, algorithm, oid, key_bitstring; local 79 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 80 !CBB_add_bytes(&oid, ed25519_asn1_meth.oid, ed25519_asn1_meth.oid_len) || 127 CBB pkcs8, algorithm, oid, private_key, inner; local 131 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 132 !CBB_add_bytes(&oid, ed25519_asn1_meth.oid, ed25519_asn1_meth.oid_len) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/nist/ |
NISTNamedCurves.java | 20 static void defineCurve(String name, ASN1ObjectIdentifier oid) 22 objIds.put(name, oid); 23 names.put(oid, name); 48 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)objIds.get(Strings.toUpperCase(name)); local 50 if (oid != null) 52 return getByOID(oid); 62 * @param oid an object identifier representing a named curve, if present. 65 ASN1ObjectIdentifier oid) 67 return SECNamedCurves.getByOID(oid); 86 ASN1ObjectIdentifier oid) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x9/ |
ECNamedCurveTable.java | 68 ASN1ObjectIdentifier oid = X962NamedCurves.getOID(name); local 70 if (oid == null) 72 oid = SECNamedCurves.getOID(name); 75 if (oid == null) 77 oid = NISTNamedCurves.getOID(name); 82 if (oid == null) 84 oid = TeleTrusTNamedCurves.getOID(name); 87 if (oid == null) 89 oid = ANSSINamedCurves.getOID(name); 94 return oid; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/util/ |
PrivateKeyFactory.java | 138 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)params.getParameters(); local 140 x9 = CustomNamedCurves.getByOID(oid); 143 x9 = ECNamedCurveTable.getByOID(oid); 146 oid, x9.getCurve(), x9.getG(), x9.getN(), x9.getH(), x9.getSeed());
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
ChainStrengthAnalyzer.java | 105 String oid = cert.getSigAlgOID(); local 107 if (oid.equals(blacklisted)) { 108 throw new CertificateException("Signature uses an insecure hash function: " + oid);
|
/external/wpa_supplicant_8/src/utils/ |
http-utils.h | 15 char *oid; member in struct:http_othername
|
/device/linaro/bootloader/arm-trusted-firmware/tools/cert_create/include/ |
ext.h | 32 const char *oid; /* OID of the extension */ member in struct:ext_s
|
/external/boringssl/src/crypto/digest_extra/ |
digest_extra.c | 85 // hash function when given a signature OID. To avoid unintended lax parsing 86 // of hash OIDs, this is no longer supported for lookup by OID or NID. 120 uint8_t oid[9]; member in struct:__anon14296 143 OPENSSL_memcmp(CBS_data(cbs), kMDOIDs[i].oid, kMDOIDs[i].oid_len) == 153 // Handle objects with no corresponding OID. 164 CBS algorithm, oid; local 166 !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) { 171 const EVP_MD *ret = cbs_to_md(&oid); 195 CBB algorithm, oid, null; local 197 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) [all...] |
/external/boringssl/src/crypto/pkcs7/ |
pkcs7.c | 144 CBB outer_seq, oid, wrapped_seq, seq, version_bytes, digest_algos_set, local 149 !CBB_add_asn1(&outer_seq, &oid, CBS_ASN1_OBJECT) || 150 !CBB_add_bytes(&oid, kPKCS7SignedData, sizeof(kPKCS7SignedData)) || 159 !CBB_add_asn1(&content_info, &oid, CBS_ASN1_OBJECT) || 160 !CBB_add_bytes(&oid, kPKCS7Data, sizeof(kPKCS7Data)) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLEntryObject.java | 143 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) e.nextElement(); local 144 Extension ext = extensions.getExtension(oid); 148 set.add(oid.getId()); 168 private Extension getExtension(ASN1ObjectIdentifier oid) 174 return exts.getExtension(oid); 180 public byte[] getExtensionValue(String oid) 182 Extension ext = getExtension(new ASN1ObjectIdentifier(oid)); 279 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 280 Extension ext = extensions.getExtension(oid); 288 if (oid.equals(Extension.reasonCode) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLEntryObject.java | 144 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) e.nextElement(); local 145 Extension ext = extensions.getExtension(oid); 149 set.add(oid.getId()); 169 private Extension getExtension(ASN1ObjectIdentifier oid) 175 return exts.getExtension(oid); 181 public byte[] getExtensionValue(String oid) 183 Extension ext = getExtension(new ASN1ObjectIdentifier(oid)); 280 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 281 Extension ext = extensions.getExtension(oid); 289 if (oid.equals(X509Extension.reasonCode) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V2AttributeCertificate.java | 208 public byte[] getExtensionValue(String oid) 214 Extension ext = extensions.getExtension(new ASN1ObjectIdentifier(oid)); 244 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 245 Extension ext = extensions.getExtension(oid); 249 set.add(oid.getId()); 289 public X509Attribute[] getAttributes(String oid) 297 if (attr.getOID().equals(oid))
|