Home
last modified time | relevance | path

Searched refs:exponent (Results 1 – 18 of 18) sorted by relevance

/system/extras/verity/
Dgenerate_verity_key.c126 BIGNUM* exponent = BN_new(); in generate_key() local
129 if (!pkey || !exponent || !rsa) { in generate_key()
134 BN_set_word(exponent, RSA_F4); in generate_key()
135 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key()
161 BN_free(exponent); in generate_key()
/system/media/audio_utils/
Dminifloat.c59 int exponent = (a >> MANTISSA_BITS) & EXPONENT_MAX; in float_from_gain() local
60 return ldexpf((exponent > 0 ? HIDDEN_BIT | mantissa : mantissa << 1) / ONE_FLOAT, in float_from_gain()
61 exponent - EXCESS); in float_from_gain()
/system/keymaster/
Drsa_key_factory.cpp83 UniquePtr<BIGNUM, BIGNUM_Delete> exponent(BN_new()); in GenerateKey() local
86 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) in GenerateKey()
89 if (!BN_set_word(exponent.get(), public_exponent) || in GenerateKey()
90 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) in GenerateKey()
/system/core/libcrypto_utils/
Dandroid_pubkey.c52 uint32_t exponent; member
91 if (!new_key->e || !BN_set_word(new_key->e, key_struct->exponent)) { in android_pubkey_decode()
159 key_struct->exponent = (uint32_t)BN_get_word(key->e); in android_pubkey_encode()
/system/core/adb/
Dadb_auth_host.cpp116 BIGNUM* exponent = BN_new(); in generate_key() local
118 if (!pkey || !exponent || !rsa) { in generate_key()
123 BN_set_word(exponent, RSA_F4); in generate_key()
124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key()
154 BN_free(exponent); in generate_key()
/system/core/libpixelflinger/
Dfixed.cpp26 int32_t gglRecipQNormalized(int32_t x, int* exponent) in gglRecipQNormalized() argument
33 *exponent = 0; in gglRecipQNormalized()
55 *exponent = 30-lz-1; in gglRecipQNormalized()
/system/tpm/trunks/
Dtrunks_client_test.cc1021 crypto::ScopedBIGNUM exponent(BN_new()); in GenerateRSAKeyPair() local
1022 CHECK(BN_set_word(exponent.get(), RSA_F4)); in GenerateRSAKeyPair()
1023 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr)) in GenerateRSAKeyPair()
Dtpm_utility_impl.cc784 public_area.parameters.rsa_detail.exponent = public_exponent; in ImportRSAKey()
874 public_area.parameters.rsa_detail.exponent = public_exponent; in CreateRSAKeyPair()
1696 public_area.parameters.rsa_detail.exponent = 0; in CreateDefaultPublicArea()
Dtpm_utility_test.cc1142 EXPECT_EQ(public_data.public_area.parameters.rsa_detail.exponent, in TEST_F()
1302 EXPECT_EQ(public_area.public_area.parameters.rsa_detail.exponent, 0x10001u); in TEST_F()
Dtpm_generated.h1515 UINT32 exponent; member
Dtpm_generated.cc6825 result = Serialize_UINT32(value.exponent, buffer); in Serialize_TPMS_RSA_PARMS()
6853 result = Parse_UINT32(buffer, &value->exponent, value_bytes); in Parse_TPMS_RSA_PARMS()
/system/security/keystore/
Dkey_store_service.cpp396 unsigned long exponent = RSA_DEFAULT_EXPONENT; in generate() local
409 exponent = BN_get_word(pubExpBn.get()); in generate()
410 if (exponent == 0xFFFFFFFFL) { in generate()
419 params.push_back(TAG_RSA_PUBLIC_EXPONENT, exponent); in generate()
/system/tpm/attestation/common/
Dtpm_utility_v1.cc655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); in ConvertPublicKeyToDER()
/system/core/libpixelflinger/include/private/pixelflinger/
Dggl_fixed.h92 int32_t gglRecipQNormalized(int32_t x, int* exponent);
/system/tpm/trunks/generator/
Draw_structures_fixed.txt14616 exponent of zero. Support for other values is optional. Use of other exponents in duplicated keys i…
14620 Implementations are not required to check that exponent is the default exponent. They may fail to l…
14621 key if exponent is not zero. The reference implementation allows the values listed in the table.
14650 exponent
14653 the public exponent
14655 When zero, indicates that the exponent is the default
Draw_structures.txt14605 exponent of zero. Support for other values is optional. Use of other exponents in duplicated keys i…
14609 Implementations are not required to check that exponent is the default exponent. They may fail to l…
14610 key if exponent is not zero. The reference implementation allows the values listed in the table.
14654 the public exponent
14656 When zero, indicates that the exponent is the default
14661 exponent
Draw_commands.txt3848 exponent of tpmKey.
4484 FOr() an RSA key, the exponent value is not supported.
4512 exponent is not prime or could not find a prime using the provided
4745 be zero and it shall be possible to form a private exponent from the two prime factors of the public
7352 the public exponent
8242 exponent of the key referenced by keyHandle. This scheme is only used if both the scheme
8659 The TPM will perform a modular exponentiation of ciphertext using the private exponent associated w…
8663 that is the result of the modular exponentiation of cipherText using the private exponent of keyHan…
Draw_commands_fixed.txt3850 exponent of tpmKey.
4486 FOr() an RSA key, the exponent value is not supported.
4514 exponent is not prime or could not find a prime using the provided
4747 be zero and it shall be possible to form a private exponent from the two prime factors of the public
7362 the public exponent
8253 exponent of the key referenced by keyHandle. This scheme is only used if both the scheme
8670 The TPM will perform a modular exponentiation of ciphertext using the private exponent associated w…
8674 that is the result of the modular exponentiation of cipherText using the private exponent of keyHan…