Home
last modified time | relevance | path

Searched refs:modulus (Results 1 – 14 of 14) sorted by relevance

/system/tpm/attestation/server/
Dpkcs11_key_store.cc272 std::string modulus(BN_num_bytes(public_key.get()->n), 0); in Register() local
274 string_as_array(&modulus))); in Register()
279 modulus.resize(length); in Register()
286 std::string id = Sha1(modulus); in Register()
288 CK_ULONG modulus_bits = modulus.size() * 8; in Register()
305 {CKA_MODULUS, string_as_array(&modulus), modulus.size()} in Register()
335 {CKA_MODULUS, string_as_array(&modulus), modulus.size()}, in Register()
/system/core/libmincrypt/tools/
DDumpPublicKey.java50 BigInteger modulus = key.getModulus(); in checkRSA() local
62 if (modulus.bitLength() != 2048) { in checkRSA()
64 modulus.bitLength() + " bits."); in checkRSA()
/system/tpm/trunks/
Dtrunks_client_test.h118 void GenerateRSAKeyPair(std::string* modulus,
Dtrunks_client_test.cc175 std::string modulus; in ImportTest() local
177 GenerateRSAKeyPair(&modulus, &prime_factor, nullptr); in ImportTest()
181 TpmUtility::AsymmetricKeyUsage::kDecryptAndSignKey, modulus, 0x10001, in ImportTest()
988 void TrunksClientTest::GenerateRSAKeyPair(std::string* modulus, in GenerateRSAKeyPair() argument
1001 modulus->resize(BN_num_bytes(rsa.get()->n), 0); in GenerateRSAKeyPair()
1003 reinterpret_cast<unsigned char*>(string_as_array(modulus))); in GenerateRSAKeyPair()
1034 std::string modulus; in LoadSigningKey() local
1036 GenerateRSAKeyPair(&modulus, &prime_factor, public_key); in LoadSigningKey()
1041 modulus, 0x10001, prime_factor, in LoadSigningKey()
Dtpm_utility_test.cc1238 std::string modulus(256, 'a'); in TEST_F() local
1252 modulus, in TEST_F()
1260 modulus.size() * 8); in TEST_F()
1263 EXPECT_EQ(public_data.public_area.unique.rsa.size, modulus.size()); in TEST_F()
1265 modulus.data(), modulus.size())); in TEST_F()
1303 std::string modulus(256, 'a'); in TEST_F() local
1308 modulus, in TEST_F()
1318 std::string modulus(256, 'a'); in TEST_F() local
1325 modulus, in TEST_F()
1334 std::string modulus; in TEST_F() local
[all …]
Dtpm_utility.h180 const std::string& modulus,
Dtpm_utility_impl.h91 const std::string& modulus,
Dtrunks_factory_for_test.cc242 const std::string& modulus, in ImportRSAKey() argument
248 return target_->ImportRSAKey(key_type, modulus, public_exponent, in ImportRSAKey()
Dtpm_utility_impl.cc772 const std::string& modulus, in ImportRSAKey() argument
805 public_area.parameters.rsa_detail.key_bits = modulus.size() * 8; in ImportRSAKey()
807 public_area.unique.rsa = Make_TPM2B_PUBLIC_KEY_RSA(modulus); in ImportRSAKey()
/system/extras/verity/
DVerityVerifier.java128 BigInteger modulus = new BigInteger(1, reverse(binaryMod)); in getMincryptPublicKey() local
131 RSAPublicKeySpec spec = new RSAPublicKeySpec(modulus, exponent); in getMincryptPublicKey()
/system/tpm/trunks/generator/
Draw_commands_fixed.txt3553 1) encryptedSalt does not contain a value that is the size of the public modulus of tpmKey,
3554 2) encryptedSalt has a value that is greater than the public modulus of tpmKey,
4746 For a two-prime RSA key, the remainder when dividing the public modulus by the private key shall
4748 modulus.
7946 modulus of the key referenced by parentHandle or inSymSeed is
8255 command is TPM_ALG_NULL. The input value cannot be larger than the public modulus of
8359 modulus (n).
8365 k ≔ the number of byes in the public modulus
8565 the numeric value of message is greater than the public modulus of
8675 …urned value may include leading octets zeros so that it is the same size as the public modulus. For
[all …]
Draw_commands.txt3553 1) encryptedSalt does not contain a value that is the size of the public modulus of tpmKey,
3554 2) encryptedSalt has a value that is greater than the public modulus of tpmKey,
4744 For a two-prime RSA key, the remainder when dividing the public modulus by the private key shall
4746 modulus.
7935 modulus of the key referenced by parentHandle or inSymSeed is
8244 command is TPM_ALG_NULL. The input value cannot be larger than the public modulus of
8348 modulus (n).
8354 k ≔ the number of byes in the public modulus
8554 the numeric value of message is greater than the public modulus of
8664 …urned value may include leading octets zeros so that it is the same size as the public modulus. For
[all …]
Draw_structures_fixed.txt6532 the modulus - 1 of the count for NV update of an orderly
13762 All primes are required to have exactly half the number of significant bits as the public modulus ,…
13763 square of each prime is required to have the same number of significant bits as the public modulus.
14009 Fp (the modulus)
14074 For a 2,048-bit public modulus key and SHA1 hash, the salt size is 256 – 20 – 2 = 234 octets.
14648 number of bits in the public modulus
14679 This structure contains the parameters for prime modulus ECC.
14947 a canonical form. For an RSA key, this will be one of the prime factors of the public modulus. After
Draw_structures.txt6524 PT_FIXED + 29 the modulus - 1 of the count for NV update of an orderly
13747 All primes are required to have exactly half the number of significant bits as the public modulus ,…
13748 square of each prime is required to have the same number of significant bits as the public modulus.
13994 Fp (the modulus)
14059 For a 2,048-bit public modulus key and SHA1 hash, the salt size is 256 – 20 – 2 = 234 octets.
14650 number of bits in the public modulus
14681 This structure contains the parameters for prime modulus ECC.
14955 a canonical form. For an RSA key, this will be one of the prime factors of the public modulus. After