HomeSort by relevance Sort by last modified time
    Searched refs:n0inv (Results 1 - 21 of 21) sorted by null

  /system/core/libcrypto_utils/
android_pubkey.c 43 uint32_t n0inv; member in struct:RSAPublicKey
95 // Note that we don't extract the montgomery parameters n0inv and rr from
98 // top 32 bits of n0inv in general. For now, we just ignore the parameters
127 BIGNUM* n0inv = BN_new(); local
138 // Compute and store n0inv = -1 / N[0] mod 2^32.
139 if (!ctx || !r32 || !n0inv || !BN_set_bit(r32, 32) ||
140 !BN_mod(n0inv, key->n, r32, ctx) ||
141 !BN_mod_inverse(n0inv, n0inv, r32, ctx) || !BN_sub(n0inv, r32, n0inv))
    [all...]
  /external/libconstrainedcrypto/include/constrainedcrypto/
rsa.h 42 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
  /external/avb/libavb/
avb_crypto.h 128 * values, |n0inv| (fits in 32 bits) and |rr| and can always be
131 * The value |n0inv| is the value -1/n[0] (mod 2^32). The value |rr|
151 uint32_t n0inv; member in struct:AvbRSAPublicKeyHeader
avb_rsa.c 42 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:IAvbKey
85 key->n0inv = h.n0inv;
142 uint32_t d0 = (uint32_t)A * key->n0inv;
avb_crypto.c 370 dest->n0inv = avb_be32toh(dest->n0inv);
  /external/vboot_reference/firmware/2lib/include/
2rsa.h 17 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:vb2_public_key
  /external/vboot_reference/firmware/lib/cryptolib/include/
rsa.h 27 uint32_t n0inv; /* -1 / n[0] mod 2^32 */ member in struct:RSAPublicKey
  /external/vboot_reference/firmware/lib20/
packed_key.c 70 key->n0inv = buf32[1];
  /external/vboot_reference/firmware/lib/cryptolib/
rsa_utility.c 21 * + sizeof len + sizeof n0inv.
72 StatefulMemcpy(&st, &key->n0inv, sizeof(key->n0inv));
rsa.c 45 uint32_t d0 = (uint32_t)A * key->n0inv;
  /external/vboot_reference/tests/
vb20_rsa_padding_tests.c 33 k2->n0inv = key->n0inv;
vb21_host_key_tests.c 231 TEST_EQ(key->n0inv, k2.n0inv, " n0inv");
rsa_utility_tests.c 90 *(buf_key_len + 1) = 0xF00D2345; /* n0inv */
100 TEST_EQ(key->n0inv, 0xF00D2345, "RSAPublicKeyFromBuf() n0inv");
  /external/vboot_reference/firmware/lib21/
packed_key.c 36 key->n0inv = buf32[1];
  /external/libconstrainedcrypto/test/
rsa_test.c 76 .n0inv = 0xf0053525,
    [all...]
  /bootable/recovery/
verifier.cpp 307 // Read key length in words and n0inv. n0inv is a precomputed montgomery
309 // verification. n0inv is 32 bits wide here, assuming the verification logic
311 // internally, in which case we don't have a valid n0inv. Thus, we just
315 // 64-bit n0inv and initialize the montgomery parameters in the key object.
317 uint32_t n0inv = 0; local
318 if (fscanf(file, " %i , 0x%x", &key_len_words, &n0inv) != 2) {
344 // generally don't have a valid |n0inv|, we ignore this (see comment above).
  /external/libconstrainedcrypto/
rsa.c 62 uint32_t d0 = (uint32_t)A * key->n0inv;
  /external/vboot_reference/firmware/2lib/
2rsa.c 56 uint32_t d0 = (uint32_t)A * key->n0inv;
201 * + sizeof len + sizeof n0inv.
  /external/avb/test/
avb_util_unittest.cc 52 h.n0inv = htobe32(n32);
62 EXPECT_EQ(n32, s.n0inv);
  /external/vboot_reference/host/lib21/
host_key.c 505 buf32[1] = pubk->n0inv;
  /external/avb/
avbtool 406 # Calculate n0inv = -1/n[0] (mod 2^32)
408 n0inv = b - modinv(key.modulus, b)
412 ret.extend(struct.pack('!II', key.num_bits, n0inv))
    [all...]

Completed in 4252 milliseconds