/system/core/libcrypto_utils/ |
android_pubkey.c | 43 uint32_t n0inv; member in struct:RSAPublicKey 95 // Note that we don't extract the montgomery parameters n0inv and rr from 98 // top 32 bits of n0inv in general. For now, we just ignore the parameters 127 BIGNUM* n0inv = BN_new(); local 138 // Compute and store n0inv = -1 / N[0] mod 2^32. 139 if (!ctx || !r32 || !n0inv || !BN_set_bit(r32, 32) || 140 !BN_mod(n0inv, key->n, r32, ctx) || 141 !BN_mod_inverse(n0inv, n0inv, r32, ctx) || !BN_sub(n0inv, r32, n0inv)) [all...] |
/external/libconstrainedcrypto/include/constrainedcrypto/ |
rsa.h | 42 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
|
/external/avb/libavb/ |
avb_crypto.h | 128 * values, |n0inv| (fits in 32 bits) and |rr| and can always be 131 * The value |n0inv| is the value -1/n[0] (mod 2^32). The value |rr| 151 uint32_t n0inv; member in struct:AvbRSAPublicKeyHeader
|
avb_rsa.c | 42 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:IAvbKey 85 key->n0inv = h.n0inv; 142 uint32_t d0 = (uint32_t)A * key->n0inv;
|
avb_crypto.c | 370 dest->n0inv = avb_be32toh(dest->n0inv);
|
/external/vboot_reference/firmware/2lib/include/ |
2rsa.h | 17 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:vb2_public_key
|
/external/vboot_reference/firmware/lib/cryptolib/include/ |
rsa.h | 27 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
|
/external/vboot_reference/firmware/lib20/ |
packed_key.c | 70 key->n0inv = buf32[1];
|
/external/vboot_reference/firmware/lib/cryptolib/ |
rsa_utility.c | 21 * + sizeof len + sizeof n0inv. 72 StatefulMemcpy(&st, &key->n0inv, sizeof(key->n0inv));
|
rsa.c | 45 uint32_t d0 = (uint32_t)A * key->n0inv;
|
/external/vboot_reference/tests/ |
vb20_rsa_padding_tests.c | 33 k2->n0inv = key->n0inv;
|
vb21_host_key_tests.c | 231 TEST_EQ(key->n0inv, k2.n0inv, " n0inv");
|
rsa_utility_tests.c | 90 *(buf_key_len + 1) = 0xF00D2345; /* n0inv */ 100 TEST_EQ(key->n0inv, 0xF00D2345, "RSAPublicKeyFromBuf() n0inv");
|
/external/vboot_reference/firmware/lib21/ |
packed_key.c | 36 key->n0inv = buf32[1];
|
/external/libconstrainedcrypto/test/ |
rsa_test.c | 76 .n0inv = 0xf0053525, [all...] |
/bootable/recovery/ |
verifier.cpp | 307 // Read key length in words and n0inv. n0inv is a precomputed montgomery 309 // verification. n0inv is 32 bits wide here, assuming the verification logic 311 // internally, in which case we don't have a valid n0inv. Thus, we just 315 // 64-bit n0inv and initialize the montgomery parameters in the key object. 317 uint32_t n0inv = 0; local 318 if (fscanf(file, " %i , 0x%x", &key_len_words, &n0inv) != 2) { 344 // generally don't have a valid |n0inv|, we ignore this (see comment above).
|
/external/libconstrainedcrypto/ |
rsa.c | 62 uint32_t d0 = (uint32_t)A * key->n0inv;
|
/external/vboot_reference/firmware/2lib/ |
2rsa.c | 56 uint32_t d0 = (uint32_t)A * key->n0inv; 201 * + sizeof len + sizeof n0inv.
|
/external/avb/test/ |
avb_util_unittest.cc | 52 h.n0inv = htobe32(n32); 62 EXPECT_EQ(n32, s.n0inv);
|
/external/vboot_reference/host/lib21/ |
host_key.c | 505 buf32[1] = pubk->n0inv;
|
/external/avb/ |
avbtool | 406 # Calculate n0inv = -1/n[0] (mod 2^32) 408 n0inv = b - modinv(key.modulus, b) 412 ret.extend(struct.pack('!II', key.num_bits, n0inv)) [all...] |