/device/asus/grouper/keymaster/ |
keymaster_grouper.cpp | 444 Unique_ByteArray modulus(bignum_to_array(rsa->n)); 445 if (modulus.get() == NULL) { 446 ALOGW("Could not convert modulus to array"); 473 {CKA_MODULUS, modulus->get(), modulus->length()}, 547 set_attribute(&privateKeyTemplate[templateOffset++], CKA_MODULUS, modulus->get(), 548 modulus->length()); 644 ByteArray modulus(new CK_BYTE[attributes[0].ulValueLen], attributes[0].ulValueLen); 647 attributes[0].pValue = modulus.get(); 657 ALOGV("modulus is %d (ret=%d), exponent is %d (ret=%d)" [all...] |
/device/asus/grouper/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 444 Unique_ByteArray modulus(bignum_to_array(rsa->n)); 445 if (modulus.get() == NULL) { 446 ALOGW("Could not convert modulus to array"); 473 {CKA_MODULUS, modulus->get(), modulus->length()}, 547 set_attribute(&privateKeyTemplate[templateOffset++], CKA_MODULUS, modulus->get(), 548 modulus->length()); 644 ByteArray modulus(new CK_BYTE[attributes[0].ulValueLen], attributes[0].ulValueLen); 647 attributes[0].pValue = modulus.get(); 657 ALOGV("modulus is %d (ret=%d), exponent is %d (ret=%d)" [all...] |
/device/asus/tilapia/self-extractors/nvidia/staging/keymaster/ |
keymaster_grouper.cpp | 444 Unique_ByteArray modulus(bignum_to_array(rsa->n)); 445 if (modulus.get() == NULL) { 446 ALOGW("Could not convert modulus to array"); 473 {CKA_MODULUS, modulus->get(), modulus->length()}, 547 set_attribute(&privateKeyTemplate[templateOffset++], CKA_MODULUS, modulus->get(), 548 modulus->length()); 644 ByteArray modulus(new CK_BYTE[attributes[0].ulValueLen], attributes[0].ulValueLen); 647 attributes[0].pValue = modulus.get(); 657 ALOGV("modulus is %d (ret=%d), exponent is %d (ret=%d)" [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
BCRSAPrivateCrtKey.java | 58 this.modulus = spec.getModulus(); 76 this.modulus = key.getModulus(); 102 this.modulus = key.getModulus(); 230 buf.append(" modulus: ").append(this.getModulus().toString(16)).append(nl);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
JCERSAPrivateCrtKey.java | 58 this.modulus = spec.getModulus(); 76 this.modulus = key.getModulus(); 102 this.modulus = key.getModulus(); 230 buf.append(" modulus: ").append(this.getModulus().toString(16)).append(nl);
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
dsa.c | 92 * -modulus - print the DSA public key 113 int modulus=0; local 186 else if (strcmp(*argv,"-modulus") == 0) 187 modulus=1; 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 320 if (modulus)
|
rsa.c | 92 * -modulus - print the RSA key modulus 116 int modulus=0; local 196 else if (strcmp(*argv,"-modulus") == 0) 197 modulus=1; 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 333 if (modulus) 335 BIO_printf(out,"Modulus=");
|
/external/openssl/apps/ |
dsa.c | 92 * -modulus - print the DSA public key 113 int modulus=0; local 186 else if (strcmp(*argv,"-modulus") == 0) 187 modulus=1; 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 320 if (modulus)
|
rsa.c | 92 * -modulus - print the RSA key modulus 116 int modulus=0; local 196 else if (strcmp(*argv,"-modulus") == 0) 197 modulus=1; 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 333 if (modulus) 335 BIO_printf(out,"Modulus=");
|
/libcore/luni/src/main/java/java/math/ |
BigInteger.java | [all...] |
/external/chromium_org/net/tools/testserver/ |
minica.py | 37 def __init__(self, modulus, e, d): 38 self.m = modulus 43 m = modulus
|
/hardware/samsung_slsi/exynos5/libkeymaster/ |
tlTeeKeymaster_Api.h | 183 * Key metadata (key size, modulus/exponent lengths, etc..) 188 uint32_t lenpubmod; /**< Public key modulus length */ 216 uint32_t modulus; /**< Modulus */ member in struct:__anon35000 217 uint32_t moduluslen; /**< Modulus length */
|
tlcTeeKeymaster_if.h | 97 * RSA private key metadata (Private modulus and exponent lengths) 100 uint32_t lenprimod; /**< Private key modulus length */ 106 * RSA CRT private key metadata (Private modulus and exponent lengths) 109 uint32_t lenprimod; /**< Private key modulus length */ 119 * Key metadata (public key hash, key size, modulus/exponent lengths, etc..) 124 uint32_t lenpubmod; /**< Public key modulus length */ 275 * |--key metadata--|--public modulus--|--public exponent--|--private exponent--| 278 * |--key metadata--|--public modulus--|--public exponent--|--P--|--Q--|--DP--|--DQ--|--Qinv--| 302 * Retrieves public key daya (modulus and exponent) from wrapped key data 306 * @param modulus [out] Pointer to public key modulus dat [all...] |
tlcTeeKeymaster_if.c | 839 * |--key metadata--|--public modulus--|--public exponent--|--private exponent--| 842 * |--key metadata--|--public modulus--|--public exponent--|--P--|--Q--|--DP--|--DQ--|--Qinv--| 950 * Retrieves public key daya (modulus and exponent) from wrapped key data 954 * @param modulus [out] Pointer to public key modulus data 955 * @param modulusLength [out] Modulus data length 962 uint8_t* modulus, 991 mcRet = mcMap(&sessionHandle, (void*)modulus, *modulusLength, &modMapInfo); 1007 pTci->getpubkey.modulus = (uint32_t)modMapInfo.sVirtualAddr; 1035 mcRet = mcUnmap(&sessionHandle, (void*)modulus, &modMapInfo) [all...] |
/external/chromium/crypto/ |
rsa_private_key_nss.cc | 124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus)); 151 if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) ||
|
/external/chromium_org/crypto/ |
rsa_private_key_nss.cc | 146 PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus))); 183 if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) ||
|
/external/ppp/pppd/ |
srp-entry.c | 23 * Index, if supplied, is the modulus/generator index from 26 * then the default "well known" EAP SRP-SHA1 modulus/generator is 29 * The default modulus/generator can be requested as index 0. 129 mytce.modulus.data = (u_char *)wkmodulus; 130 mytce.modulus.len = sizeof (wkmodulus); 136 (void) fprintf(stderr, "SRP modulus/generator %d not found\n",
|
/libcore/crypto/src/main/java/org/conscrypt/ |
ServerKeyExchange.java | 101 public static void updateSignatureRsa(DigitalSignature ds, BigInteger modulus, 105 tmp = ServerKeyExchange.toUnsignedByteArray(modulus);
|
/external/chromium_org/net/android/ |
keystore_openssl.cc | 54 // are used to hold the typical modulus / exponent / parameters for the 82 // to manually setup the modulus field (n) in the RSA object, with a 292 // to match the private key's modulus. 293 std::vector<uint8> modulus; local 294 if (!GetRSAKeyModulus(private_key, &modulus)) { 295 LOG(ERROR) << "Failed to get private key modulus"; 298 if (!SwapBigNumPtrFromBytes(modulus, &rsa.get()->n)) { 299 LOG(ERROR) << "Failed to decode private key modulus";
|
/external/chromium_org/net/third_party/nss/ssl/ |
ssl3prot.h | 198 SECItem modulus; member in struct:__anon12181
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_nss.c | 172 const u8 *modulus, size_t modulus_len,
|
crypto_gnutls.c | 156 const u8 *modulus, size_t modulus_len, 167 gcry_mpi_scan(&bn_modulus, GCRYMPI_FMT_USG, modulus, modulus_len,
|
/prebuilts/tools/common/mkidentity/ |
mkidentity-prebuilt.jar | |
/external/chromium_org/v8/test/webkit/ |
mod-crash.js | 48 // Test that reusing a floating point value after use in a modulus works correctly.
|
/external/chromium_org/chrome/browser/policy/test/ |
policy_testserver.py | 386 The reply depends on the value of the modulus: 387 1: replies with no new modulus and the sha256 hash of "0" 388 2: replies with a new modulus, 4. 389 4: replies with a new modulus, 2. 391 16: replies with a new modulus, 16. 392 32: replies with a new modulus, 1. 393 anything else: replies with no new modulus and an empty list of hashes 405 if msg.modulus == 1: 407 elif msg.modulus == 2: 409 elif msg.modulus == 4 [all...] |