Searched refs:ASN1 (Results 1 – 8 of 8) sorted by relevance
61 if (mDERBuffer[mDERIndex] == ASN1.TAG_Padding) { in DERParser()64 if (mDERBuffer[mDERIndex] != ASN1.TAG_Padding) { in DERParser()128 if (mDERBuffer[mDERIndex] == ASN1.TAG_Padding) { in isEndofBuffer()131 if (mDERBuffer[mDERIndex] != ASN1.TAG_Padding) { in isEndofBuffer()219 if (parseTLV(ASN1.TAG_OID) == 0) throw new PKCS15Exception("[Parser] OID Length is null"); in parseOID()245 parseTLV(ASN1.TAG_Sequence); in parsePathAttributes()246 parseTLV(ASN1.TAG_OctetString); in parsePathAttributes()
39 public abstract class ASN1 { class
40 import com.android.se.security.arf.ASN1;73 der.parseTLV(ASN1.TAG_ApplTemplate); in decodeDER()75 der.parseTLV(ASN1.TAG_ApplIdentifier); in decodeDER()80 if (objectType == ASN1.TAG_ApplLabel) { in decodeDER()83 der.parseTLV(ASN1.TAG_ApplPath); in decodeDER()84 } else if (objectType != ASN1.TAG_ApplPath) { in decodeDER()
47 import com.android.se.security.arf.ASN1;143 if (der.parseTLV(ASN1.TAG_Sequence) > 0) { in decodeDER()147 if (tempTLVData[0] == ASN1.TAG_OctetString) { in decodeDER()148 derRule.parseTLV(ASN1.TAG_OctetString); in decodeDER()159 } else if (tempTLVData[0] == ASN1.TAG_Padding) { in decodeDER()198 if (tag == ASN1.TAG_OctetString) { in decodeDER()209 == ASN1.TAG_OctetString) { in decodeDER()
41 import com.android.se.security.arf.ASN1;78 der.parseTLV(ASN1.TAG_Sequence); in decodeDER()81 der.parseTLV(ASN1.TAG_Sequence); in decodeDER()90 der.parseTLV(ASN1.TAG_Sequence); in decodeDER()
45 import com.android.se.security.arf.ASN1;81 der.parseTLV(ASN1.TAG_Sequence); in decodeDER()82 if (der.parseTLV(ASN1.TAG_OctetString) != REFRESHTAG_LEN) { in decodeDER()
46 import com.android.se.security.arf.ASN1;87 der.parseTLV(ASN1.TAG_Sequence); in decodeDER()90 der.parseTLV(ASN1.TAG_OctetString); in decodeDER()
28 import com.android.se.security.arf.ASN1;120 der.parseTLV(ASN1.TAG_FCP); in decodeUSIMFileProps()