HomeSort by relevance Sort by last modified time
    Searched defs:n0inv (Results 1 - 6 of 6) sorted by null

  /system/core/include/mincrypt/
rsa.h 42 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
  /external/vboot_reference/firmware/2lib/include/
2rsa.h 17 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:vb2_public_key
  /external/vboot_reference/firmware/lib/cryptolib/include/
rsa.h 27 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
  /system/extras/verity/
generate_verity_key.c 54 BIGNUM* n0inv = BN_new(); local
61 BN_mod_inverse(n0inv, rem, r32, ctx);
64 pkey->n0inv = 0 - BN_get_word(n0inv);
75 BN_free(n0inv);
  /bootable/recovery/
verifier.cpp 309 // Read key length in words and n0inv. n0inv is a precomputed montgomery
311 // verification. n0inv is 32 bits wide here, assuming the verification logic
313 // internally, in which case we don't have a valid n0inv. Thus, we just
317 // 64-bit n0inv and initialize the montgomery parameters in the key object.
319 uint32_t n0inv = 0; local
320 if (fscanf(file, " %i , 0x%x", &key_len_words, &n0inv) != 2) {
346 // generally don't have a valid |n0inv|, we ignore this (see comment above).
  /system/core/adb/
adb_auth_host.cpp 73 BIGNUM* n0inv = BN_new(); local
85 BN_mod_inverse(n0inv, rem, r32, ctx);
88 pkey->n0inv = 0 - BN_get_word(n0inv);
98 BN_free(n0inv);

Completed in 935 milliseconds