/system/tpm/attestation/server/ |
D | pkcs11_key_store.cc | 272 std::string modulus(BN_num_bytes(public_key.get()->n), 0); in Register() local 274 string_as_array(&modulus))); in Register() 279 modulus.resize(length); in Register() 286 std::string id = Sha1(modulus); in Register() 288 CK_ULONG modulus_bits = modulus.size() * 8; in Register() 305 {CKA_MODULUS, string_as_array(&modulus), modulus.size()} in Register() 335 {CKA_MODULUS, string_as_array(&modulus), modulus.size()}, in Register()
|
/system/core/libmincrypt/tools/ |
D | DumpPublicKey.java | 50 BigInteger modulus = key.getModulus(); in checkRSA() local 62 if (modulus.bitLength() != 2048) { in checkRSA() 64 modulus.bitLength() + " bits."); in checkRSA()
|
/system/tpm/trunks/ |
D | trunks_client_test.h | 118 void GenerateRSAKeyPair(std::string* modulus,
|
D | trunks_client_test.cc | 175 std::string modulus; in ImportTest() local 177 GenerateRSAKeyPair(&modulus, &prime_factor, nullptr); in ImportTest() 181 TpmUtility::AsymmetricKeyUsage::kDecryptAndSignKey, modulus, 0x10001, in ImportTest() 988 void TrunksClientTest::GenerateRSAKeyPair(std::string* modulus, in GenerateRSAKeyPair() argument 1001 modulus->resize(BN_num_bytes(rsa.get()->n), 0); in GenerateRSAKeyPair() 1003 reinterpret_cast<unsigned char*>(string_as_array(modulus))); in GenerateRSAKeyPair() 1034 std::string modulus; in LoadSigningKey() local 1036 GenerateRSAKeyPair(&modulus, &prime_factor, public_key); in LoadSigningKey() 1041 modulus, 0x10001, prime_factor, in LoadSigningKey()
|
D | tpm_utility_test.cc | 1238 std::string modulus(256, 'a'); in TEST_F() local 1252 modulus, in TEST_F() 1260 modulus.size() * 8); in TEST_F() 1263 EXPECT_EQ(public_data.public_area.unique.rsa.size, modulus.size()); in TEST_F() 1265 modulus.data(), modulus.size())); in TEST_F() 1303 std::string modulus(256, 'a'); in TEST_F() local 1308 modulus, in TEST_F() 1318 std::string modulus(256, 'a'); in TEST_F() local 1325 modulus, in TEST_F() 1334 std::string modulus; in TEST_F() local [all …]
|
D | tpm_utility.h | 180 const std::string& modulus,
|
D | tpm_utility_impl.h | 91 const std::string& modulus,
|
D | trunks_factory_for_test.cc | 242 const std::string& modulus, in ImportRSAKey() argument 248 return target_->ImportRSAKey(key_type, modulus, public_exponent, in ImportRSAKey()
|
D | tpm_utility_impl.cc | 772 const std::string& modulus, in ImportRSAKey() argument 805 public_area.parameters.rsa_detail.key_bits = modulus.size() * 8; in ImportRSAKey() 807 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(modulus); in ImportRSAKey()
|
/system/extras/verity/ |
D | VerityVerifier.java | 128 BigInteger modulus = new BigInteger(1, reverse(binaryMod)); in getMincryptPublicKey() local 131 RSAPublicKeySpec spec = new RSAPublicKeySpec(modulus, exponent); in getMincryptPublicKey()
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 3553 1) encryptedSalt does not contain a value that is the size of the public modulus of tpmKey, 3554 2) encryptedSalt has a value that is greater than the public modulus of tpmKey, 4746 For a two-prime RSA key, the remainder when dividing the public modulus by the private key shall 4748 modulus. 7946 modulus of the key referenced by parentHandle or inSymSeed is 8255 command is TPM_ALG_NULL. The input value cannot be larger than the public modulus of 8359 modulus (n). 8365 k ≔ the number of byes in the public modulus 8565 the numeric value of message is greater than the public modulus of 8675 …urned value may include leading octets zeros so that it is the same size as the public modulus. For [all …]
|
D | raw_commands.txt | 3553 1) encryptedSalt does not contain a value that is the size of the public modulus of tpmKey, 3554 2) encryptedSalt has a value that is greater than the public modulus of tpmKey, 4744 For a two-prime RSA key, the remainder when dividing the public modulus by the private key shall 4746 modulus. 7935 modulus of the key referenced by parentHandle or inSymSeed is 8244 command is TPM_ALG_NULL. The input value cannot be larger than the public modulus of 8348 modulus (n). 8354 k ≔ the number of byes in the public modulus 8554 the numeric value of message is greater than the public modulus of 8664 …urned value may include leading octets zeros so that it is the same size as the public modulus. For [all …]
|
D | raw_structures_fixed.txt | 6532 the modulus - 1 of the count for NV update of an orderly 13762 All primes are required to have exactly half the number of significant bits as the public modulus ,… 13763 square of each prime is required to have the same number of significant bits as the public modulus. 14009 Fp (the modulus) 14074 For a 2,048-bit public modulus key and SHA1 hash, the salt size is 256 – 20 – 2 = 234 octets. 14648 number of bits in the public modulus 14679 This structure contains the parameters for prime modulus ECC. 14947 a canonical form. For an RSA key, this will be one of the prime factors of the public modulus. After
|
D | raw_structures.txt | 6524 PT_FIXED + 29 the modulus - 1 of the count for NV update of an orderly 13747 All primes are required to have exactly half the number of significant bits as the public modulus ,… 13748 square of each prime is required to have the same number of significant bits as the public modulus. 13994 Fp (the modulus) 14059 For a 2,048-bit public modulus key and SHA1 hash, the salt size is 256 – 20 – 2 = 234 octets. 14650 number of bits in the public modulus 14681 This structure contains the parameters for prime modulus ECC. 14955 a canonical form. For an RSA key, this will be one of the prime factors of the public modulus. After
|