/external/scapy/test/ |
D | x509.uts | 60 tbs = x.tbsCertificate 61 tbs.version == ASN1_INTEGER(2) 64 tbs.serialNumber == ASN1_INTEGER(0xb45e7043e7090b71) 67 assert(type(tbs.signature) is X509_AlgorithmIdentifier) 68 tbs.signature.algorithm == ASN1_OID("sha1_with_rsa_signature") 71 assert(type(tbs.issuer) is list) 72 assert(len(tbs.issuer) == 7) 73 assert(type(tbs.issuer[0]) is X509_RDN) 74 assert(type(tbs.issuer[0].rdn) is list) 75 assert(type(tbs.issuer[0].rdn[0]) is X509_AttributeTypeAndValue) [all …]
|
/external/iproute2/tc/ |
D | tc_util.c | 715 struct rtattr *tbs[TCA_STATS_MAX + 1]; in print_tcstats2_attr() local 717 parse_rtattr_nested(tbs, TCA_STATS_MAX, rta); in print_tcstats2_attr() 719 if (tbs[TCA_STATS_BASIC]) { in print_tcstats2_attr() 722 memcpy(&bs, RTA_DATA(tbs[TCA_STATS_BASIC]), MIN(RTA_PAYLOAD(tbs[TCA_STATS_BASIC]), sizeof(bs))); in print_tcstats2_attr() 727 if (tbs[TCA_STATS_QUEUE]) { in print_tcstats2_attr() 730 memcpy(&q, RTA_DATA(tbs[TCA_STATS_QUEUE]), MIN(RTA_PAYLOAD(tbs[TCA_STATS_QUEUE]), sizeof(q))); in print_tcstats2_attr() 735 if (tbs[TCA_STATS_RATE_EST64]) { in print_tcstats2_attr() 738 memcpy(&re, RTA_DATA(tbs[TCA_STATS_RATE_EST64]), in print_tcstats2_attr() 739 MIN(RTA_PAYLOAD(tbs[TCA_STATS_RATE_EST64]), in print_tcstats2_attr() 743 } else if (tbs[TCA_STATS_RATE_EST]) { in print_tcstats2_attr() [all …]
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/evp/ |
D | p_ed25519.c | 49 size_t *siglen, const uint8_t *tbs, in pkey_ed25519_sign_message() argument 67 if (!ED25519_sign(sig, tbs, tbslen, key->key.priv)) { in pkey_ed25519_sign_message() 76 size_t siglen, const uint8_t *tbs, in pkey_ed25519_verify_message() argument 80 !ED25519_verify(tbs, tbslen, sig, key->key.pub.value)) { in pkey_ed25519_verify_message()
|
D | p_ec.c | 119 const uint8_t *tbs, size_t tbslen) { in pkey_ec_sign() argument 131 if (!ECDSA_sign(0, tbs, tbslen, sig, &sltmp, ec)) { in pkey_ec_sign() 139 const uint8_t *tbs, size_t tbslen) { in pkey_ec_verify() argument 140 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->pkey->pkey.ec); in pkey_ec_verify()
|
D | internal.h | 207 const uint8_t *tbs, size_t tbslen); 210 const uint8_t *tbs, size_t tbslen); 213 const uint8_t *tbs, size_t tbslen); 216 const uint8_t *tbs, size_t tbslen);
|
D | p_rsa.c | 172 const uint8_t *tbs, size_t tbslen) { in pkey_rsa_sign() argument 191 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { in pkey_rsa_sign() 198 return RSA_sign_pss_mgf1(rsa, siglen, sig, *siglen, tbs, tbslen, in pkey_rsa_sign() 206 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); in pkey_rsa_sign() 210 size_t siglen, const uint8_t *tbs, in pkey_rsa_verify() argument 218 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); in pkey_rsa_verify() 221 return RSA_verify_pss_mgf1(rsa, tbs, tbslen, rctx->md, rctx->mgf1md, in pkey_rsa_verify() 235 CRYPTO_memcmp(tbs, rctx->tbuf, rslen) != 0) { in pkey_rsa_verify()
|
/external/boringssl/src/crypto/evp/ |
D | p_ed25519.c | 49 size_t *siglen, const uint8_t *tbs, in pkey_ed25519_sign_message() argument 67 if (!ED25519_sign(sig, tbs, tbslen, key->key.priv)) { in pkey_ed25519_sign_message() 76 size_t siglen, const uint8_t *tbs, in pkey_ed25519_verify_message() argument 80 !ED25519_verify(tbs, tbslen, sig, key->key.pub.value)) { in pkey_ed25519_verify_message()
|
D | internal.h | 207 const uint8_t *tbs, size_t tbslen); 210 const uint8_t *tbs, size_t tbslen); 213 const uint8_t *tbs, size_t tbslen); 216 const uint8_t *tbs, size_t tbslen);
|
D | p_ec.c | 119 const uint8_t *tbs, size_t tbslen) { in pkey_ec_sign() argument 131 if (!ECDSA_sign(0, tbs, tbslen, sig, &sltmp, ec)) { in pkey_ec_sign() 139 const uint8_t *tbs, size_t tbslen) { in pkey_ec_verify() argument 140 return ECDSA_verify(0, tbs, tbslen, sig, siglen, ctx->pkey->pkey.ec); in pkey_ec_verify()
|
D | p_rsa.c | 172 const uint8_t *tbs, size_t tbslen) { in pkey_rsa_sign() argument 191 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { in pkey_rsa_sign() 198 return RSA_sign_pss_mgf1(rsa, siglen, sig, *siglen, tbs, tbslen, in pkey_rsa_sign() 206 return RSA_sign_raw(rsa, siglen, sig, *siglen, tbs, tbslen, rctx->pad_mode); in pkey_rsa_sign() 210 size_t siglen, const uint8_t *tbs, in pkey_rsa_verify() argument 218 return RSA_verify(EVP_MD_type(rctx->md), tbs, tbslen, sig, siglen, rsa); in pkey_rsa_verify() 221 return RSA_verify_pss_mgf1(rsa, tbs, tbslen, rctx->md, rctx->mgf1md, in pkey_rsa_verify() 235 CRYPTO_memcmp(tbs, rctx->tbuf, rslen) != 0) { in pkey_rsa_verify()
|
/external/arm-trusted-firmware/drivers/auth/mbedtls/ |
D | mbedtls_x509_parser.c | 39 static mbedtls_asn1_buf tbs; variable 56 ZERO_AND_CLEAN(tbs) in clear_temp_vars() 174 tbs.p = p; in cert_parse() 181 tbs.len = end - tbs.p; in cert_parse() 441 *param = (void *)tbs.p; in get_auth_param() 442 *param_len = (unsigned int)tbs.len; in get_auth_param()
|
/external/libnl/lib/route/ |
D | tc.c | 107 struct nlattr *tbs[TCA_STATS_MAX + 1]; in rtnl_tc_msg_parse() local 109 err = nla_parse_nested(tbs, TCA_STATS_MAX, tb[TCA_STATS2], in rtnl_tc_msg_parse() 114 if (tbs[TCA_STATS_BASIC]) { in rtnl_tc_msg_parse() 117 bs = nla_data(tbs[TCA_STATS_BASIC]); in rtnl_tc_msg_parse() 122 if (tbs[TCA_STATS_RATE_EST]) { in rtnl_tc_msg_parse() 125 re = nla_data(tbs[TCA_STATS_RATE_EST]); in rtnl_tc_msg_parse() 130 if (tbs[TCA_STATS_QUEUE]) { in rtnl_tc_msg_parse() 133 q = nla_data(tbs[TCA_STATS_QUEUE]); in rtnl_tc_msg_parse() 143 if (tbs[TCA_STATS_APP]) { in rtnl_tc_msg_parse() 144 tc->tc_xstats = nl_data_alloc_attr(tbs[TCA_STATS_APP]); in rtnl_tc_msg_parse()
|
/external/conscrypt/common/src/main/java/org/conscrypt/ct/ |
D | CertificateEntry.java | 90 byte[] tbs = leaf.getTBSCertificateWithoutExtension(CTConstants.X509_SCT_LIST_OID); in createForPrecertificate() 97 return createForPrecertificate(tbs, issuerKeyHash); in createForPrecertificate()
|
/external/conscrypt/repackaged/common/src/main/java/com/android/org/conscrypt/ct/ |
D | CertificateEntry.java | 95 byte[] tbs = leaf.getTBSCertificateWithoutExtension(CTConstants.X509_SCT_LIST_OID); in createForPrecertificate() 102 return createForPrecertificate(tbs, issuerKeyHash); in createForPrecertificate()
|
/external/tpm2-tss/lib/ |
D | tss2-tcti-tbs.def | 1 LIBRARY tss2-tcti-tbs
|
/external/openscreen/cast/common/certificate/ |
D | cast_cert_validator_internal.cc | 269 uint8_t* tbs = nullptr; in VerifyCertificateChain() local 270 int tbs_len = i2d_X509_tbs(subject, &tbs); in VerifyCertificateChain() 274 bssl::UniquePtr<uint8_t> free_tbs{tbs}; in VerifyCertificateChain() 278 digest, public_key.get(), {tbs, static_cast<uint32_t>(tbs_len)}, in VerifyCertificateChain()
|
/external/tpm2-tss/ |
D | Makefile.am | 215 lib/tss2-tcti-tbs.def \ 216 src/tss2-tcti/tcti-tbs.c \ 217 src/tss2-tcti/tcti-tbs.h \ 218 src/tss2-tcti/tss2-tcti-tbs.vcxproj \ 219 src/tss2-tcti/tss2-tcti-tbs.vcxproj.filters \
|
D | tpm2-tss.sln | 25 Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "tss2-tcti-tbs", "src\tss2-tcti\tss2-tcti-tbs.v…
|
D | CHANGELOG.md | 77 - Null-pointer problems in tcti-tbs
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.6.3rc1.rst | 695 Remove sha256.tbs-internet.com ssl test
|
D | 3.7.0a1.rst | 4918 Remove sha256.tbs-internet.com ssl test
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.15rc1.rst | 1354 Remove sha256.tbs-internet.com ssl test
|
D | 2.7.4rc1.rst | 2889 Update certificate chain for sha256.tbs-internet.com, fixing a test failure
|
/external/arm-trusted-firmware/docs/design/ |
D | auth-framework.rst | 516 auth_param_type_desc_t *tbs; /* Data signed */
|
/external/walt/hardware/enclosure/ |
D | WALT_recessed_enclosure.stl | 1407 …�]B�-A��,@��\B��A��,@�����zw?��\B��A�@��\B��A��,@�\B��A�@tbs���x?�\B��A�@… 1426 …c(B��,@1>BB�,(B��,@�zw�����1>BB�,(B�@1>BB�,(B��,@gLBB.�'B�@��x�tbs�gLBB.�'B�@1>B… 1517 B�@tbs>��x�e��@�� 1629 …[@��,@�?A��@��,@�zw?���>�?A��@�@�?A��@��,@3�?A�F@�@��x?tbs>3�?A�F@�@�?…
|