Lines Matching defs:to

8  * particular file as subject to the "Classpath" exception as provided
18 * 2 along with this work; if not, write to the Free Software Foundation,
47 * <p> X.500 names are used to identify entities, such as those which are
50 * some systems can be searched for according to those attributes.
87 * PrintableString and BMPString) may be assumed to represent
99 * substrings of one or more consecutive white space characters to a
103 * These name comparison rules permit a certificate user to validate
104 * certificates issued using languages or encodings unfamiliar to the
108 * comparison rules to process unfamiliar attribute types for name
109 * chaining. This allows implementations to process certificates with
113 * specifications indicate that the character sets used to encode data
115 * compared without regard to encoding. Implementations of the profile
116 * are permitted to use the comparison algorithm defined in the X.500
169 * Constructs a name from a string formatted according to format.
172 * constructor. RFC2253 is format strictly according to RFC2253
687 * (according to 2.2), starting with the last element of the sequence
720 * (according to 2.2), starting with the last element of the sequence
738 * Returns the value of toString(). This call is needed to
813 * @param out where to put the DER-encoded X.500 name
823 * @param out where to put the DER-encoded X.500 name
835 * guarantee that they neither modify it not expose it to untrusted
863 * According to RFC 1779, RDNs in a DN are separated by comma.
906 * is part of the RDN. Otherwise, it is used as a separator, to
924 // Set quote counter back to zero
963 * is part of the RDN. Otherwise, it is used as a separator, to
1002 static int countQuotes(String string, int from, int to) {
1005 for (int i = from; i < to; i++) {
1040 rdnEnd--; // back up to last backSlash
1110 * Maybe return a preallocated OID, to reduce storage costs
1219 * expect to deal with often
1251 * @param inputName to be checked for being constrained
1411 * Note that we are using privileged reflection to access the hidden