/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
H A D | RSAPrivateKeyStructure.java | 21 private BigInteger modulus; field in class:RSAPrivateKeyStructure 54 BigInteger modulus, 64 this.modulus = modulus; 86 modulus = ((ASN1Integer)e.nextElement()).getValue(); 108 return modulus; 151 * modulus INTEGER, -- n 53 RSAPrivateKeyStructure( BigInteger modulus, BigInteger publicExponent, BigInteger privateExponent, BigInteger prime1, BigInteger prime2, BigInteger exponent1, BigInteger exponent2, BigInteger coefficient) argument
|
/external/dropbear/libtomcrypt/testprof/ |
H A D | ecc_test.c | 35 void *modulus, *mp, *kA, *kB, *rA, *rB; local 40 DO(mp_init_multi(&kA, &kB, &rA, &rB, &modulus, NULL)); 58 DO(mp_read_radix(modulus, ltc_ecc_sets[z].prime, 16)); 59 DO(mp_montgomery_setup(modulus, &mp)); 70 DO(ltc_mp.ecc_ptmul(rA, G, A, modulus, 1)); 73 DO(ltc_mp.ecc_ptmul(rB, G, B, modulus, 1)); 82 DO(ltc_mp.ecc_ptmul(kA, A, C1, modulus, 0)); 83 DO(ltc_mp.ecc_ptmul(kB, B, C2, modulus, 0)); 84 DO(ltc_mp.ecc_ptadd(C1, C2, C1, modulus, mp)); 85 DO(ltc_mp.ecc_map(C1, modulus, m [all...] |
/external/libvpx/libvpx/vp9/encoder/ |
H A D | vp9_subexp.c | 33 static int split_index(int i, int n, int modulus) { argument 34 int max1 = (n - 1 - modulus / 2) / modulus + 1; 35 if (i % modulus == modulus / 2) 36 i = i / modulus; 38 i = max1 + i - (i + modulus - modulus / 2) / modulus;
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
H A D | cryptomath.py | 263 def powMod(base, power, modulus): 266 modulus = gmpy.mpz(modulus) 267 result = pow(base, power, modulus) 274 def powMod(base, power, modulus): 277 """ Return base**power mod modulus, using multi bit scanning 299 lowPowers.append((lowPowers[i-1] * base) % modulus) 310 prod = (prod * prod) % modulus 311 if nib: prod = (prod * lowPowers[nib]) % modulus 315 prodInv = invMod(prod, modulus) [all...] |
/external/chromium_org/net/android/ |
H A D | keystore.h | 35 // Returns the modulus of a given RSAPrivateKey platform object, 40 // |modulus| will receive the modulus bytes on success. 44 std::vector<uint8>* modulus);
|
H A D | keystore_openssl.cc | 54 // are used to hold the typical modulus / exponent / parameters for the 82 // to manually setup the modulus field (n) in the RSA object, with a 342 // to match the private key's modulus. 343 std::vector<uint8> modulus; local 344 if (!GetRSAKeyModulus(private_key, &modulus)) { 345 LOG(ERROR) << "Failed to get private key modulus"; 348 if (!SwapBigNumPtrFromBytes(modulus, &rsa.get()->n)) { 349 LOG(ERROR) << "Failed to decode private key modulus";
|
/external/chromium/crypto/ |
H A D | rsa_private_key_win.cc | 59 pki.modulus()->size() + 78 rsa_pub_key->bitlen = pki.modulus()->size() * 8; 87 memcpy(dest, &pki.modulus()->front(), pki.modulus()->size()); 88 dest += pki.modulus()->size(); 161 pki.modulus()->assign(pos, pos + mod_size);
|
H A D | rsa_private_key_nss.cc | 124 SECItem *ck_id = PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus)); 151 if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) ||
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/util/encoders/ |
H A D | Base64Encoder.java | 62 int modulus = length % 3; 63 int dataLength = (length - modulus); 84 switch (modulus) 113 return (dataLength / 3) * 4 + ((modulus == 0) ? 0 : 4);
|
/external/openssh/ |
H A D | dh.c | 135 logit("WARNING: %s does not exist, using fixed modulus", 265 dh_new_group_asc(const char *gen, const char *modulus) argument 272 if (BN_hex2bn(&dh->p, modulus) == 0) 286 dh_new_group(BIGNUM *gen, BIGNUM *modulus) argument 292 dh->p = modulus;
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | auto_enrollment_client_unittest.cc | 81 void ServerWillReply(int64 modulus, bool with_hashes, bool with_serial_hash) { argument 85 if (modulus >= 0) 86 enrollment_response->set_expected_modulus(modulus); 165 EXPECT_EQ(16, auto_enrollment_request().modulus()); 237 EXPECT_EQ(128, auto_enrollment_request().modulus()); 284 EXPECT_EQ(1, auto_enrollment_request().modulus()); 300 EXPECT_EQ(GG_INT64_C(1) << i, auto_enrollment_request().modulus());
|
H A D | auto_enrollment_client.cc | 37 // The modulus value is sent in an int64 field in the protobuf, whose maximum 142 LOG(ERROR) << "Initial auto-enrollment modulus is larger than the limit, " 289 // Server is asking us to retry with a different modulus. 290 int64 modulus = enrollment_response.expected_modulus(); local 291 int power = NextPowerOf2(modulus); 292 if ((GG_INT64_C(1) << power) != modulus) { 294 << "modulus. Using the closest power-of-2 instead " 295 << "(" << modulus << " vs 2^" << power << ")"; 299 << "modulus but the server asked for a new one again: " 303 << "modulus tha [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
H A D | tomcrypt_pk.h | 25 /** The modulus */ 104 /** The modulus */ 256 int ltc_ecc_projective_dbl_point(ecc_point *P, ecc_point *R, void *modulus, void *mp); 259 int ltc_ecc_projective_add_point(ecc_point *P, ecc_point *Q, ecc_point *R, void *modulus, void *mp); 263 int ltc_ecc_fp_mulmod(void *k, ecc_point *G, ecc_point *R, void *modulus, int map); 270 int ltc_ecc_mulmod(void *k, ecc_point *G, ecc_point *R, void *modulus, int map); 277 void *modulus); 282 ecc_point *C, void *modulus); 289 int ltc_ecc_map(ecc_point *P, void *modulus, void *mp); 295 /* Max diff between group and modulus siz [all...] |
H A D | tomcrypt_math.h | 242 @param b The modulus (upto bits_per_digit in length) 267 @param c The modulus 275 @param b The modulus 283 @param b The modulus 292 @param a The modulus 300 @param b The modulus 307 @param b The modulus 324 @param c The modulus integer 343 @param modulus The modulus fo [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
H A D | BCRSAPrivateCrtKey.java | 58 this.modulus = spec.getModulus(); 76 this.modulus = key.getModulus(); 102 this.modulus = key.getModulus(); 230 buf.append(" modulus: ").append(this.getModulus().toString(16)).append(nl);
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
H A D | JCERSAPrivateCrtKey.java | 58 this.modulus = spec.getModulus(); 76 this.modulus = key.getModulus(); 102 this.modulus = key.getModulus(); 230 buf.append(" modulus: ").append(this.getModulus().toString(16)).append(nl);
|
/external/chromium_org/net/tools/testserver/ |
H A D | minica.py | 37 def __init__(self, modulus, e, d): 38 self.m = modulus 43 m = modulus
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
H A D | dsa.c | 92 * -modulus - print the DSA public key 113 int modulus=0; local 186 else if (strcmp(*argv,"-modulus") == 0) 187 modulus=1; 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 320 if (modulus)
|
H A D | rsa.c | 92 * -modulus - print the RSA key modulus 116 int modulus=0; local 196 else if (strcmp(*argv,"-modulus") == 0) 197 modulus=1; 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 333 if (modulus)
|
/external/openssl/apps/ |
H A D | dsa.c | 92 * -modulus - print the DSA public key 113 int modulus=0; local 186 else if (strcmp(*argv,"-modulus") == 0) 187 modulus=1; 234 BIO_printf(bio_err," -modulus print the DSA public value\n"); 320 if (modulus)
|
H A D | rsa.c | 92 * -modulus - print the RSA key modulus 116 int modulus=0; local 196 else if (strcmp(*argv,"-modulus") == 0) 197 modulus=1; 240 BIO_printf(bio_err," -modulus print the RSA key modulus\n"); 333 if (modulus)
|
/external/chromium_org/chrome/browser/policy/test/ |
H A D | policy_testserver.py | 385 The reply depends on the value of the modulus: 386 1: replies with no new modulus and the sha256 hash of "0" 387 2: replies with a new modulus, 4. 388 4: replies with a new modulus, 2. 390 16: replies with a new modulus, 16. 391 32: replies with a new modulus, 1. 392 anything else: replies with no new modulus and an empty list of hashes 404 if msg.modulus == 1: 406 elif msg.modulus == 2: 408 elif msg.modulus [all...] |
/external/chromium_org/crypto/ |
H A D | rsa_private_key_nss.cc | 133 PK11_MakeIDFromPubKey(&(result->public_key_->u.rsa.modulus))); 170 if (!ReadAttribute(key_, CKA_MODULUS, private_key_info.modulus()) ||
|
/external/ppp/pppd/ |
H A D | srp-entry.c | 23 * Index, if supplied, is the modulus/generator index from 26 * then the default "well known" EAP SRP-SHA1 modulus/generator is 29 * The default modulus/generator can be requested as index 0. 129 mytce.modulus.data = (u_char *)wkmodulus; 130 mytce.modulus.len = sizeof (wkmodulus); 136 (void) fprintf(stderr, "SRP modulus/generator %d not found\n",
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3prot.h | 197 SECItem modulus; member in struct:__anon9081
|