354355356357358359360361362363364
DERDecoder dec; clear(); version_ = new ASN1Integer(VERSION); add(version_); algorithm_ = new AlgorithmIdentifier(); add(algorithm_);
394395396397398399400401
* * @param version * The version number. */ public void setVersion(int version) { version_ = new ASN1Integer(version); set(0, version_); }
125126127128129130131132133
add(mac_); macSalt_ = new ASN1OctetString(); add(macSalt_); iter_ = new ASN1Integer(); iter_.setOptional(true); add(iter_); }
142143144145146147148149150151
add(mac_); macSalt_ = new ASN1OctetString(salt); add(macSalt_); iter_ = new ASN1Integer(it); if (it == 1) // default value? iter_.setOptional(true); add(iter_); }
160161162163164165166167168169170
super(3); certificationRequestInfo_ = new ASN1Sequence(); version_ = new ASN1Integer(0); certificationRequestInfo_.add(version_); subject_ = new Name(); certificationRequestInfo_.add(subject_);
182183184185186187188189190191192
if (oid == null) { throw new NullPointerException("Need an OID!"); } if (value == null) { value = new ASN1Null(); } type_ = oid; values_ = new ASN1Set(1); values_.add(value);
9899100101102103104105106107
* resolves the ANY DEFINED BY type. If the statement info is never * actually required then an ASN1Opaque may be used to save the overhead * of actually decoding the info. --volker roth */ oid_ = new ASN1ObjectIdentifier(); info_ = new ASN1Null(); info_.setOptional(true); add(oid_); add(info_); }
131132133134135136137138139140141
oid_ = new ASN1ObjectIdentifier(oid); if (oid.equals("2.1.0.2.0")) { parameter_ = new ASN1Null(); } else if (oid.equals("2.1.0.2.2")) { parameter_ = new ASN1Integer((BigInteger)obj); }
132133134135136137138139140141142
135136137138139140141142143144145
*/ public ASN1Type resolve(ASN1Type caller) throws ResolverException { if (oid_.toString().equals("2.1.0.2.0")) { return new ASN1Null(); } else if (oid_.toString().equals("2.1.0.2.2")) { return new ASN1Integer(); }