/packages/apps/SecureElement/src/com/android/se/security/arf/ |
DERParser.java | 214 * Parses standardized OID 216 * @return String containing OID 219 if (parseTLV(ASN1.TAG_OID) == 0) throw new PKCS15Exception("[Parser] OID Length is null"); 222 StringBuffer oid = new StringBuffer(); local 226 // The first subidentifier contains the first two OID components 229 oid.append(subid / 40).append('.').append(subid % 40); 231 oid.append("2.").append(subid - 80); 234 while (mDERIndex < end) oid.append('.').append(readIntBase128()); 235 Log.i(mTag, "Found OID: " + oid.toString()) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x500/style/ |
BCStyle.java | 181 * default look up table translating OID values into their common symbols following 276 protected ASN1Encodable encodeStringValue(ASN1ObjectIdentifier oid, 278 if (oid.equals(EmailAddress) || oid.equals(DC)) 282 else if (oid.equals(DATE_OF_BIRTH)) // accept time string as well as # (for compatibility) 286 else if (oid.equals(C) || oid.equals(SN) || oid.equals(DN_QUALIFIER) 287 || oid.equals(TELEPHONE_NUMBER)) 292 return super.encodeStringValue(oid, value) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/x509/ |
X509Extensions.java | 248 * the extensions are a list of constructed sequences, either with (OID, OctetString) or (OID, Boolean, OctetString) 279 * it's is assumed the table contains OID/String pairs. 290 * It's is assumed the table contains OID/String pairs. 317 ASN1ObjectIdentifier oid = ASN1ObjectIdentifier.getInstance(e.nextElement()); local 318 X509Extension ext = (X509Extension)extensions.get(oid); 320 this.extensions.put(oid, ext); 348 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 351 this.extensions.put(oid, ext); 371 ASN1ObjectIdentifier oid) 393 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 456 Object oid = ordering.elementAt(i); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/x509/ |
X509CRLEntryObject.java | 143 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) e.nextElement(); local 144 Extension ext = extensions.getExtension(oid); 148 set.add(oid.getId()); 168 private Extension getExtension(ASN1ObjectIdentifier oid) 174 return exts.getExtension(oid); 180 public byte[] getExtensionValue(String oid) 182 Extension ext = getExtension(new ASN1ObjectIdentifier(oid)); 279 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 280 Extension ext = extensions.getExtension(oid); 288 if (oid.equals(Extension.reasonCode) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
X509CRLEntryObject.java | 144 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier) e.nextElement(); local 145 Extension ext = extensions.getExtension(oid); 149 set.add(oid.getId()); 169 private Extension getExtension(ASN1ObjectIdentifier oid) 175 return exts.getExtension(oid); 181 public byte[] getExtensionValue(String oid) 183 Extension ext = getExtension(new ASN1ObjectIdentifier(oid)); 280 ASN1ObjectIdentifier oid = (ASN1ObjectIdentifier)e.nextElement(); local 281 Extension ext = extensions.getExtension(oid); 289 if (oid.equals(X509Extension.reasonCode) [all...] |
/external/libcups/cups/ |
sidechannel.c | 277 * 'cupsSideChannelSNMPGet()' - Query a SNMP OID's value. 279 * This function asks the backend to do a SNMP OID query on behalf of the 282 * "oid" contains a numeric OID consisting of integers separated by periods, 287 * buffer to hold the OID value as a string. HEX-String (binary) values are 289 * NULL-Value and unknown OID types are returned as the empty string. 301 const char *oid, /* I - OID to query */ 302 char *data, /* I - Buffer for OID value */ 303 int *datalen, /* IO - Size of OID buffer on entry, size of value on return * [all...] |
sidechannel.h | 62 CUPS_SC_CMD_SNMP_GET = 6, /* Query an SNMP OID @since CUPS 1.4/macOS 10.6@ */ 63 CUPS_SC_CMD_SNMP_GET_NEXT = 7, /* Query the next SNMP OID @since CUPS 1.4/macOS 10.6@ */ 107 typedef void (*cups_sc_walk_func_t)(const char *oid, const char *data, 129 extern cups_sc_status_t cupsSideChannelSNMPGet(const char *oid, char *data, 132 extern cups_sc_status_t cupsSideChannelSNMPWalk(const char *oid, double timeout,
|
snmp.c | 42 unsigned length, int *oid, int oidsize); 58 const int *oid); 63 static unsigned asn1_size_oid(const int *oid); 83 * '_cupsSNMPCopyOID()' - Copy an OID. 88 int * /* O - New OID */ 89 _cupsSNMPCopyOID(int *dst, /* I - Destination OID */ 90 const int *src, /* I - Source OID */ 154 * '_cupsSNMPIsOID()' - Test whether a SNMP response contains the specified OID. 156 * The array pointed to by "oid" is terminated by the value -1. 161 const int *oid) /* I - OID * 734 int oid[CUPS_SNMP_MAX_OID]; \/* OID value *\/ local [all...] |
snmp-private.h | 33 #define CUPS_SNMP_MAX_OID 128 /* Maximum number of OID numbers */ 77 int oid[CUPS_SNMP_MAX_OID]; /* OID value */ member in union:cups_snmp_value_u 113 extern int _cupsSNMPIsOID(cups_snmp_t *packet, const int *oid) 134 const int *oid) _CUPS_API_1_4;
|
/external/boringssl/src/crypto/evp/ |
p_ed25519_asn1.c | 76 CBB spki, algorithm, oid, key_bitstring; local 79 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 80 !CBB_add_bytes(&oid, ed25519_asn1_meth.oid, ed25519_asn1_meth.oid_len) || 127 CBB pkcs8, algorithm, oid, private_key, inner; local 131 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 132 !CBB_add_bytes(&oid, ed25519_asn1_meth.oid, ed25519_asn1_meth.oid_len) ||
|
p_rsa_asn1.c | 71 CBB spki, algorithm, oid, null, key_bitstring; local 74 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 75 !CBB_add_bytes(&oid, rsa_asn1_meth.oid, rsa_asn1_meth.oid_len) || 117 CBB pkcs8, algorithm, oid, null, private_key; local 121 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 122 !CBB_add_bytes(&oid, rsa_asn1_meth.oid, rsa_asn1_meth.oid_len) ||
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cert/ |
X509v3CertificateBuilder.java | 112 * @param oid the OID defining the extension type. 118 ASN1ObjectIdentifier oid, 123 CertUtils.addExtension(extGenerator, oid, isCritical, value); 147 * @param oid the OID defining the extension type. 153 ASN1ObjectIdentifier oid, 158 extGenerator.addExtension(oid, isCritical, encodedValue); 167 * @param oid the OID defining the extension type [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/cms/ |
AttributeTable.java | 61 ASN1ObjectIdentifier oid, 64 Object value = attributes.get(oid); 68 attributes.put(oid, a); 88 attributes.put(oid, v); 93 * Return the first attribute matching the OBJECT IDENTIFIER oid. 95 * @param oid type of attribute required. 96 * @return first attribute found of type oid. 99 ASN1ObjectIdentifier oid) 101 Object value = attributes.get(oid); 112 * Return all the attributes matching the OBJECT IDENTIFIER oid. The vector will be [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/config/ |
ConfigurableProvider.java | 48 void addAlgorithm(String type, ASN1ObjectIdentifier oid, String className); 52 void addKeyInfoConverter(ASN1ObjectIdentifier oid, AsymmetricKeyInfoConverter keyInfoConverter);
|
/external/conscrypt/platform/src/main/java/org/conscrypt/ |
InternalUtil.java | 47 byte[] ocspResponse, String oid, OpenSSLX509Certificate x509, 49 return NativeCrypto.get_ocsp_single_extension(ocspResponse, oid, x509.getContext(), x509,
|
ChainStrengthAnalyzer.java | 105 String oid = cert.getSigAlgOID(); local 107 if (oid.equals(blacklisted)) { 108 throw new CertificateException("Signature uses an insecure hash function: " + oid);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
SafeBag.java | 22 ASN1ObjectIdentifier oid, 25 this.bagId = oid; 31 ASN1ObjectIdentifier oid, 35 this.bagId = oid;
|
/external/wpa_supplicant_8/src/tls/ |
x509v3.h | 15 struct asn1_oid oid; member in struct:x509_algorithm_identifier 152 int x509_sha1_oid(struct asn1_oid *oid); 153 int x509_sha256_oid(struct asn1_oid *oid); 154 int x509_sha384_oid(struct asn1_oid *oid); 155 int x509_sha512_oid(struct asn1_oid *oid);
|
tlsv1_client_ocsp.c | 34 static int is_oid_basic_ocsp_resp(struct asn1_oid *oid) 36 return oid->len == 10 && 37 oid->oid[0] == 1 /* iso */ && 38 oid->oid[1] == 3 /* identified-organization */ && 39 oid->oid[2] == 6 /* dod */ && 40 oid->oid[3] == 1 /* internet */ & 685 struct asn1_oid oid; local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ |
ASN1ObjectIdentifier.java | 22 * return an OID from the passed in object 164 * Create an OID based on the passed in String. 166 * @param identifier a string representation of an OID. 177 throw new IllegalArgumentException("string " + identifier + " not an OID"); 185 * Create an OID that creates a branch under the current one. 188 * @return the OID for the new created branch. 190 ASN1ObjectIdentifier(ASN1ObjectIdentifier oid, String branchID) 194 throw new IllegalArgumentException("string " + branchID + " not a valid OID branch"); 197 this.identifier = oid.getId() + "." + branchID; 201 * Return the OID as a string 428 ASN1ObjectIdentifier oid = pool.get(hdl); local 472 ASN1ObjectIdentifier oid = pool.get(hdl); local [all...] |
/external/snakeyaml/src/test/java/org/yaml/snakeyaml/issues/issue56/ |
PerlTest.java | 43 Integer oid = (Integer) map.get("oid"); local 44 if (oid == 123058) { 54 assertTrue(oid > 10000); 81 Integer oid = (Integer) map.get("oid"); local 82 assertTrue(oid > 10000); 98 Integer oid = (Integer) map.get("oid"); local 99 assertTrue(oid > 10000) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 167 * Set the signature algorithm. This can be either a name or an OID, names 232 String oid, 236 this.addExtension(new ASN1ObjectIdentifier(oid), critical, value); 243 ASN1ObjectIdentifier oid, 247 extGenerator.addExtension(new ASN1ObjectIdentifier(oid.getId()), critical, value); 256 String oid, 260 this.addExtension(new ASN1ObjectIdentifier(oid), critical, value); 267 ASN1ObjectIdentifier oid, 271 extGenerator.addExtension(new ASN1ObjectIdentifier(oid.getId()), critical, value); 280 String oid, [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/util/ |
ECUtil.java | 149 ASN1ObjectIdentifier oid = ASN1ObjectIdentifier.getInstance(params.getParameters()); local 150 X9ECParameters ecP = ECUtil.getNamedCurveByOid(oid); 155 ecP = (X9ECParameters)extraCurves.get(oid); 157 domainParameters = new ECNamedDomainParameters(oid, ecP.getCurve(), ecP.getG(), ecP.getN(), ecP.getH(), ecP.getSeed()); 330 ASN1ObjectIdentifier oid = X962NamedCurves.getOID(name); local 332 if (oid == null) 334 oid = SECNamedCurves.getOID(name); 335 if (oid == null) 337 oid = NISTNamedCurves.getOID(name); 341 if (oid == null [all...] |
/device/linaro/bootloader/arm-trusted-firmware/drivers/auth/mbedtls/ |
mbedtls_common.mk | 28 oid.c \
|
/external/boringssl/src/crypto/digest_extra/ |
digest_extra.c | 85 // hash function when given a signature OID. To avoid unintended lax parsing 86 // of hash OIDs, this is no longer supported for lookup by OID or NID. 120 uint8_t oid[9]; member in struct:__anon14296 143 OPENSSL_memcmp(CBS_data(cbs), kMDOIDs[i].oid, kMDOIDs[i].oid_len) == 153 // Handle objects with no corresponding OID. 164 CBS algorithm, oid; local 166 !CBS_get_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) { 171 const EVP_MD *ret = cbs_to_md(&oid); 195 CBB algorithm, oid, null; local 197 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT)) [all...] |