HomeSort by relevance Sort by last modified time
    Searched full:modulus (Results 51 - 75 of 737) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/
RSAMultiPrimePrivateCrtKeySpecTest.java 58 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
87 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
97 * Assertion: NullPointerException if modulus is null
118 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
149 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
180 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
211 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
242 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
273 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
304 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
    [all...]
  /libcore/luni/src/test/java/tests/security/spec/
RSAMultiPrimePrivateCrtKeySpecTest.java 51 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
80 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
90 * Assertion: NullPointerException if modulus is null
111 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
142 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
173 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
204 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
235 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
266 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
297 * <code>RSAMultiPrimePrivateCrtKeySpec(BigInteger modulus,
    [all...]
  /external/gemmlowp/internal/
common.h 197 // the fixed Modulus.
198 template <unsigned Modulus, typename Integer>
200 return i - (i % Modulus);
204 // the fixed Modulus.
205 template <unsigned Modulus, typename Integer>
207 return RoundDown<Modulus>(i + Modulus - 1);
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/rpcsvc/
key_prot.x 58 * PROOT and MODULUS define the way the Diffie-Hellman key is generated.
60 * MODULUS should be chosen as a prime of the form: MODULUS == 2*p + 1,
64 * (1) (PROOT ** 2) % MODULUS != 1
65 * (2) (PROOT ** p) % MODULUS != 1
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/rpcsvc/
key_prot.x 58 * PROOT and MODULUS define the way the Diffie-Hellman key is generated.
60 * MODULUS should be chosen as a prime of the form: MODULUS == 2*p + 1,
64 * (1) (PROOT ** 2) % MODULUS != 1
65 * (2) (PROOT ** p) % MODULUS != 1
  /external/libcxx/test/std/numerics/rand/rand.eng/rand.eng.lcong/
values.pass.cpp 19 // static constexpr result_type modulus = m;
39 static_assert((LCE::modulus == m), "");
45 where(LCE::modulus);
  /ndk/sources/cxx-stl/llvm-libc++/libcxx/test/numerics/rand/rand.eng/rand.eng.lcong/
values.pass.cpp 19 // static constexpr result_type modulus = m;
39 static_assert((LCE::modulus == m), "");
45 where(LCE::modulus);
  /external/ppp/pppd/
srp-entry.c 23 * Index, if supplied, is the modulus/generator index from
26 * then the default "well known" EAP SRP-SHA1 modulus/generator is
29 * The default modulus/generator can be requested as index 0.
129 mytce.modulus.data = (u_char *)wkmodulus;
130 mytce.modulus.len = sizeof (wkmodulus);
136 (void) fprintf(stderr, "SRP modulus/generator %d not found\n",
  /system/core/libmincrypt/tools/
DumpPublicKey.java 50 BigInteger modulus = key.getModulus(); local
62 if (modulus.bitLength() != 2048) {
63 throw new Exception("Modulus should be 2048 bits long but is " +
64 modulus.bitLength() + " bits.");
113 int nwords = N.bitLength() / 32; // # of 32 bit integers in modulus
133 // Write out modulus as little endian array of integers.
  /external/chromium-trace/catapult/third_party/gsutil/third_party/pyasn1-modules/pyasn1_modules/
rfc2437.py 31 namedtype.NamedType('modulus', univ.Integer()),
43 namedtype.NamedType('modulus', univ.Integer()),
  /external/compiler-rt/lib/builtins/arm/
modsi3.S 1 /*===-- modsi3.S - 32-bit signed integer modulus --------------------------===//
10 * This file implements the __modsi3 (32-bit signed integer modulus) function
  /external/tpm2/
RSA_Decrypt.c 19 // TPM_RC_SIZE cipherText is not the size of the modulus of key referenced by
22 // greater that the modulus of keyHandle
  /device/google/contexthub/util/nanoapp_sign/
nanoapp_sign.c 120 uint32_t modulus[RSA_LIMBS]; member in struct:RsaData
136 memcpy(rsa->modulus, sigPack + RSA_BYTES, RSA_BYTES);
139 rsaResult = rsaPubOp(&rsa->state, rsa->num, rsa->modulus);
232 memcpy(masterPubKey, rsa->modulus, RSA_BYTES);
270 if (memcmp(masterPubKey, rsa->modulus, RSA_BYTES) == 0) {
384 rsaResult = rsaPrivOp(&rsa->state, rsa->num, rsa->exponent, rsa->modulus);
395 ret = (fwrite(rsa->modulus, 1, RSA_BYTES, out) == RSA_BYTES) ? 0 : 2;
512 if (!readFile(rsa.modulus, sizeof(rsa.modulus), keyPubFile))
515 printHashRev(stderr, "RSA modulus", rsa.modulus, RSA_LIMBS)
    [all...]
  /art/runtime/interpreter/mterp/arm/
binopLit16.S 9 * vCC (r1). Useful for integer division and modulus.
  /art/runtime/interpreter/mterp/arm64/
binopLit16.S 9 * vCC (w1). Useful for integer division and modulus.
binopLit8.S 9 * vCC (w1). Useful for integer division and modulus.
binopWide.S 9 * vCC (w1). Useful for integer division and modulus.
binopWide2addr.S 8 * vCC (w1). Useful for integer division and modulus.
  /art/runtime/interpreter/mterp/mips/
binop.S 9 * vCC (a1). Useful for integer division and modulus. Note that we
binop2addr.S 8 * vCC (a1). Useful for integer division and modulus.
binopLit16.S 9 * vCC (a1). Useful for integer division and modulus.
binopLit8.S 9 * vCC (a1). Useful for integer division and modulus.
  /art/runtime/interpreter/mterp/mips64/
binop.S 9 * vCC (a1). Useful for integer division and modulus. Note that we
binop2addr.S 9 * vB (a1). Useful for integer division and modulus. Note that we
binopLit16.S 9 * CCCC (a1). Useful for integer division and modulus.

Completed in 1719 milliseconds

1 23 4 5 6 7 8 91011>>