/system/extras/verity/ |
D | generate_verity_key.c | 126 BIGNUM* exponent = BN_new(); in generate_key() local 129 if (!pkey || !exponent || !rsa) { in generate_key() 134 BN_set_word(exponent, RSA_F4); in generate_key() 135 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key() 161 BN_free(exponent); in generate_key()
|
/system/media/audio_utils/ |
D | minifloat.c | 59 int exponent = (a >> MANTISSA_BITS) & EXPONENT_MAX; in float_from_gain() local 60 return ldexpf((exponent > 0 ? HIDDEN_BIT | mantissa : mantissa << 1) / ONE_FLOAT, in float_from_gain() 61 exponent - EXCESS); in float_from_gain()
|
/system/keymaster/km_openssl/ |
D | rsa_key_factory.cpp | 81 UniquePtr<BIGNUM, BIGNUM_Delete> exponent(BN_new()); in GenerateKey() local 84 if (exponent.get() == NULL || rsa_key.get() == NULL || pkey.get() == NULL) in GenerateKey() 87 if (!BN_set_word(exponent.get(), public_exponent) || in GenerateKey() 88 !RSA_generate_key_ex(rsa_key.get(), key_size, exponent.get(), NULL /* callback */)) in GenerateKey()
|
/system/core/libcrypto_utils/ |
D | android_pubkey.c | 52 uint32_t exponent; member 91 if (!new_key->e || !BN_set_word(new_key->e, key_struct->exponent)) { in android_pubkey_decode() 159 key_struct->exponent = (uint32_t)BN_get_word(key->e); in android_pubkey_encode()
|
/system/core/adb/ |
D | adb_auth_host.cpp | 116 BIGNUM* exponent = BN_new(); in generate_key() local 118 if (!pkey || !exponent || !rsa) { in generate_key() 123 BN_set_word(exponent, RSA_F4); in generate_key() 124 RSA_generate_key_ex(rsa, 2048, exponent, NULL); in generate_key() 154 BN_free(exponent); in generate_key()
|
/system/core/libpixelflinger/ |
D | fixed.cpp | 26 int32_t gglRecipQNormalized(int32_t x, int* exponent) in gglRecipQNormalized() argument 33 *exponent = 0; in gglRecipQNormalized() 55 *exponent = 30-lz-1; in gglRecipQNormalized()
|
/system/tpm/trunks/ |
D | trunks_client_test.cc | 1023 bssl::UniquePtr<BIGNUM> exponent(BN_new()); in GenerateRSAKeyPair() local 1024 CHECK(BN_set_word(exponent.get(), RSA_F4)); in GenerateRSAKeyPair() 1025 CHECK(RSA_generate_key_ex(rsa.get(), 2048, exponent.get(), nullptr)) in GenerateRSAKeyPair()
|
D | tpm_utility_impl.cc | 784 public_area.parameters.rsa_detail.exponent = public_exponent; in ImportRSAKey() 874 public_area.parameters.rsa_detail.exponent = public_exponent; in CreateRSAKeyPair() 1696 public_area.parameters.rsa_detail.exponent = 0; in CreateDefaultPublicArea()
|
D | tpm_utility_test.cc | 1142 EXPECT_EQ(public_data.public_area.parameters.rsa_detail.exponent, in TEST_F() 1303 EXPECT_EQ(public_area.public_area.parameters.rsa_detail.exponent, 0x10001u); in TEST_F()
|
D | tpm_generated.h | 1515 UINT32 exponent; member
|
D | tpm_generated.cc | 6825 result = Serialize_UINT32(value.exponent, buffer); in Serialize_TPMS_RSA_PARMS() 6853 result = Parse_UINT32(buffer, &value->exponent, value_bytes); in Parse_TPMS_RSA_PARMS()
|
/system/security/keystore/ |
D | key_store_service.cpp | 474 unsigned long exponent = RSA_DEFAULT_EXPONENT; in generate() local 489 exponent = BN_get_word(pubExpBn.get()); in generate() 490 if (exponent == 0xFFFFFFFFL) { in generate() 501 params.push_back(TAG_RSA_PUBLIC_EXPONENT, exponent); in generate()
|
/system/tpm/attestation/common/ |
D | tpm_utility_v1.cc | 655 rsa.get()->e = BN_bin2bn(parms->exponent, parms->exponentSize, nullptr); in ConvertPublicKeyToDER()
|
/system/core/libpixelflinger/include/private/pixelflinger/ |
D | ggl_fixed.h | 92 int32_t gglRecipQNormalized(int32_t x, int* exponent);
|
/system/tpm/trunks/generator/ |
D | raw_structures_fixed.txt | 14616 exponent of zero. Support for other values is optional. Use of other exponents in duplicated keys i… 14620 Implementations are not required to check that exponent is the default exponent. They may fail to l… 14621 key if exponent is not zero. The reference implementation allows the values listed in the table. 14650 exponent 14653 the public exponent 14655 When zero, indicates that the exponent is the default
|
D | raw_structures.txt | 14605 exponent of zero. Support for other values is optional. Use of other exponents in duplicated keys i… 14609 Implementations are not required to check that exponent is the default exponent. They may fail to l… 14610 key if exponent is not zero. The reference implementation allows the values listed in the table. 14654 the public exponent 14656 When zero, indicates that the exponent is the default 14661 exponent
|
D | raw_commands.txt | 3848 exponent of tpmKey. 4484 FOr() an RSA key, the exponent value is not supported. 4512 exponent is not prime or could not find a prime using the provided 4745 be zero and it shall be possible to form a private exponent from the two prime factors of the public 7352 the public exponent 8242 exponent of the key referenced by keyHandle. This scheme is only used if both the scheme 8659 The TPM will perform a modular exponentiation of ciphertext using the private exponent associated w… 8663 that is the result of the modular exponentiation of cipherText using the private exponent of keyHan…
|
D | raw_commands_fixed.txt | 3850 exponent of tpmKey. 4486 FOr() an RSA key, the exponent value is not supported. 4514 exponent is not prime or could not find a prime using the provided 4747 be zero and it shall be possible to form a private exponent from the two prime factors of the public 7362 the public exponent 8253 exponent of the key referenced by keyHandle. This scheme is only used if both the scheme 8670 The TPM will perform a modular exponentiation of ciphertext using the private exponent associated w… 8674 that is the result of the modular exponentiation of cipherText using the private exponent of keyHan…
|